Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-25641 (GCVE-0-2020-25641)
Vulnerability from cvelistv5
Published
2020-10-06 13:33
Modified
2024-08-04 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "name": "[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "name": "openSUSE-SU-2020:1655", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "name": "USN-4576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4576-1/" }, { "name": "openSUSE-SU-2020:1698", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "n/a", "versions": [ { "status": "affected", "version": "kernel versions before 5.9-rc7" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-31T17:06:23", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "name": "[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "name": "openSUSE-SU-2020:1655", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "name": "USN-4576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4576-1/" }, { "name": "openSUSE-SU-2020:1698", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "kernel versions before 5.9-rc7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "name": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "refsource": "MISC", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "name": "[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "name": "openSUSE-SU-2020:1655", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "name": "USN-4576-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4576-1/" }, { "name": "openSUSE-SU-2020:1698", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25641", "datePublished": "2020-10-06T13:33:22", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-25641\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-10-06T14:15:12.603\",\"lastModified\":\"2024-11-21T05:18:18.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en la implementaci\u00f3n de biovecs del kernel de Linux en versiones anteriores a 5.9-rc7.\u0026#xa0;Una petici\u00f3n de biovec de longitud cero emitida por el subsistema de bloques podr\u00eda causar que el Kernel entre en un bucle infinito, causando una denegaci\u00f3n de servicio.\u0026#xa0;Este fallo permite a un atacante local con privilegios b\u00e1sicos emitir peticiones a un dispositivo de bloqueo, resultando en una denegaci\u00f3n de servicio.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.8.13\",\"matchCriteriaId\":\"CB3FD8E8-06B6-4E73-9337-49E751C7FD04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C150C3-165E-42D6-80D4-87B11340B08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F51360-AF61-433B-9FD9-D7DE742FABF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF43A64-F1B2-49B5-9B1A-3C5287E30CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD5DFA0-15FB-44C2-8C2F-DCABACB998B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA3DDD5-5114-44C0-8805-0A0579BB0034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"573B49F4-C6E1-4032-B46F-70506FE98562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F80706-7471-472D-B9A8-ABDB3C714B4B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/10/06/9\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1881424\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4576-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kernel.org/doc/html/latest/block/biovecs.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/10/06/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1881424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4576-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kernel.org/doc/html/latest/block/biovecs.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
suse-su-2020:2905-1
Vulnerability from csaf_suse
Published
2020-10-13 13:49
Modified
2020-10-13 13:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).
- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC: Fix reference count leaks (bsc#1112178).
- fbcon: prevent user font height or width change from causing (bsc#1112178)
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- Hide e21a4f3a930c as of its duplication
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast() (bsc#1112178).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- mac802154: tx: fix use-after-free (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- stmmac: Do not access tx_q->dirty_tx before netif_tx_lock (git-fixes).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2905,SUSE-SLE-Module-Basesystem-15-SP1-2020-2905,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2905,SUSE-SLE-Module-Legacy-15-SP1-2020-2905,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2905,SUSE-SLE-Product-HA-15-SP1-2020-2905,SUSE-SLE-Product-WE-15-SP1-2020-2905
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).\n- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: Convert pr_\u003clevel\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC: Fix reference count leaks (bsc#1112178).\n- fbcon: prevent user font height or width change from causing (bsc#1112178) \t\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- Hide e21a4f3a930c as of its duplication\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).\n- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).\n- iio: adc: mcp3422: fix locking on error path (git-fixes).\n- iio: adc: mcp3422: fix locking scope (git-fixes).\n- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).\n- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).\n- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: SVM: fix svn_pin_memory()\u0027s use of get_user_pages_fast() (bsc#1112178).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- mac802154: tx: fix use-after-free (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u003casm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- stmmac: Do not access tx_q-\u003edirty_tx before netif_tx_lock (git-fixes).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2905,SUSE-SLE-Module-Basesystem-15-SP1-2020-2905,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2905,SUSE-SLE-Module-Legacy-15-SP1-2020-2905,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2905,SUSE-SLE-Product-HA-15-SP1-2020-2905,SUSE-SLE-Product-WE-15-SP1-2020-2905", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2905-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2905-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202905-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2905-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176410", "url": "https://bugzilla.suse.com/1176410" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-13T13:49:03Z", "generator": { "date": "2020-10-13T13:49:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2905-1", "initial_release_date": "2020-10-13T13:49:03Z", "revision_history": [ { "date": "2020-10-13T13:49:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.61.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.61.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.61.1.aarch64", "product_id": "kernel-syms-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.61.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.61.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.61.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.61.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.61.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.61.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.61.1.noarch", "product_id": "kernel-devel-4.12.14-197.61.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.61.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.61.1.noarch", "product_id": "kernel-docs-4.12.14-197.61.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.61.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.61.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.61.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.61.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.61.1.noarch", "product_id": "kernel-macros-4.12.14-197.61.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.61.1.noarch", "product": { "name": "kernel-source-4.12.14-197.61.1.noarch", "product_id": "kernel-source-4.12.14-197.61.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.61.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.61.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.61.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.61.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.61.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.61.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.61.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.61.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.61.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.61.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.61.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.61.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.61.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.61.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-4.12.14-197.61.1.s390x", "product_id": "kernel-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.61.1.s390x", "product_id": "kernel-default-base-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.61.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.61.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.61.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.61.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.61.1.s390x", "product_id": "kernel-default-man-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.61.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.61.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.61.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.61.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.61.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.61.1.s390x", "product_id": "kernel-syms-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.61.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.61.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.61.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.61.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.61.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.61.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.61.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.61.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.61.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.61.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.61.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.61.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.61.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.61.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.61.1.x86_64", "product_id": "kernel-debug-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.61.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.61.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.61.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.61.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.61.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.61.1.x86_64", "product_id": "kernel-syms-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.61.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.61.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.61.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.61.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.61.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.61.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.61.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.61.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.61.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.61.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.61.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.61.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.61.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.61.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.61.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.61.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
suse-su-2020:2980-1
Vulnerability from csaf_suse
Published
2020-10-21 11:29
Modified
2020-10-21 11:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2980,SUSE-SLE-Module-Basesystem-15-SP2-2020-2980,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2980,SUSE-SLE-Module-Legacy-15-SP2-2020-2980,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2980,SUSE-SLE-Product-HA-15-SP2-2020-2980,SUSE-SLE-Product-WE-15-SP2-2020-2980
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). \n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- Move upstreamed intel-vbtn patch into sorted section\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFS: Fix security label length not being reset (bsc#1176381).\n- NFS: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).\n- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- Rename patches to the same name as in SLE15-SP3.\n- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2980,SUSE-SLE-Module-Basesystem-15-SP2-2020-2980,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2980,SUSE-SLE-Module-Legacy-15-SP2-2020-2980,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2980,SUSE-SLE-Product-HA-15-SP2-2020-2980,SUSE-SLE-Product-WE-15-SP2-2020-2980", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2980-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2980-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202980-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2980-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-21T11:29:08Z", "generator": { "date": "2020-10-21T11:29:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2980-1", "initial_release_date": "2020-10-21T11:29:08Z", "revision_history": [ { "date": "2020-10-21T11:29:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-extra-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.aarch64", "product_id": "kernel-obs-build-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.aarch64", "product": { "name": "kernel-syms-5.3.18-24.29.2.aarch64", "product_id": "kernel-syms-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.29.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.29.2.noarch", "product": { "name": "kernel-devel-5.3.18-24.29.2.noarch", "product_id": "kernel-devel-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.29.2.noarch", "product": { "name": "kernel-docs-5.3.18-24.29.2.noarch", "product_id": "kernel-docs-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.29.2.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.29.2.noarch", "product_id": "kernel-docs-html-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.29.2.noarch", "product": { "name": "kernel-macros-5.3.18-24.29.2.noarch", "product_id": "kernel-macros-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.29.2.noarch", "product": { "name": "kernel-source-5.3.18-24.29.2.noarch", "product_id": "kernel-source-5.3.18-24.29.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.29.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.29.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.29.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.29.2.ppc64le", "product_id": "kernel-syms-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.s390x", "product_id": "dlm-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-5.3.18-24.29.2.s390x", "product_id": "kernel-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.s390x", "product_id": "kernel-default-devel-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.s390x", "product_id": "kernel-default-extra-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.s390x", "product_id": "kernel-obs-build-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.s390x", "product_id": "kernel-obs-qa-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.s390x", "product": { "name": "kernel-syms-5.3.18-24.29.2.s390x", "product_id": "kernel-syms-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.29.2.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.29.2.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "product_id": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.29.2.9.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-extra-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_29-preempt-1-5.3.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.29.2.x86_64", "product_id": "kernel-obs-build-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.29.2.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.29.2.x86_64", "product": { "name": "kernel-syms-5.3.18-24.29.2.x86_64", "product_id": "kernel-syms-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.29.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-devel-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-macros-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-docs-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.29.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch" }, "product_reference": "kernel-source-5.3.18-24.29.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-syms-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-24.29.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-24.29.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-1-5.3.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.29.2.9.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.29.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-21T11:29:08Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:2907-1
Vulnerability from csaf_suse
Published
2020-10-13 13:49
Modified
2020-10-13 13:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).
- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).
The following non-security bugs were fixed:
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).
- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).
- btrfs: relocation: allow signal to cancel balance (bsc#1174354).
- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- fbcon: prevent user font height or width change from causing (bsc#1112178)
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- Hide e21a4f3a930c as of its duplication
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- mac802154: tx: fix use-after-free (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- Revert 'rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857' This reverts commit 971fc3df729b6a7692040f4e7fc7664d8e12c659.
- Revert 'sign also s390x kernel images (bsc#1163524)'
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).
- scsi: libfc: Handling of extra kref (bsc#1175528).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).
- scsi: libfc: Skip additional kref updating work event (bsc#1175528).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2907,SUSE-SLE-SERVER-12-SP5-2020-2907
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).\n- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).\n\nThe following non-security bugs were fixed:\n\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: Convert pr_\u003clevel\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).\n- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).\n- btrfs: relocation: allow signal to cancel balance (bsc#1174354).\n- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- fbcon: prevent user font height or width change from causing (bsc#1112178) \n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- Hide e21a4f3a930c as of its duplication\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- mac802154: tx: fix use-after-free (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u003casm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- Revert \u0027rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857\u0027 This reverts commit 971fc3df729b6a7692040f4e7fc7664d8e12c659.\n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 \n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).\n- scsi: libfc: Handling of extra kref (bsc#1175528).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).\n- scsi: libfc: Skip additional kref updating work event (bsc#1175528).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2907,SUSE-SLE-SERVER-12-SP5-2020-2907", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2907-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2907-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202907-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2907-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174354", "url": "https://bugzilla.suse.com/1174354" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175528", "url": "https://bugzilla.suse.com/1175528" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176410", "url": "https://bugzilla.suse.com/1176410" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-13T13:49:40Z", "generator": { "date": "2020-10-13T13:49:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2907-1", "initial_release_date": "2020-10-13T13:49:40Z", "revision_history": [ { "date": "2020-10-13T13:49:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.31.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.31.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.31.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.31.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.31.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.31.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.31.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.31.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.31.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.31.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.31.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.31.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.31.1.x86_64", "product_id": "kernel-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.31.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.31.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.31.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.31.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.31.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.31.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.31.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.31.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.31.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.31.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.31.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:40Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
suse-su-2020:2999-1
Vulnerability from csaf_suse
Published
2020-10-22 08:06
Modified
2020-10-22 08:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel RT was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-14386: Fixed a memory corruption which could have been exploited to gain root privileges from unprivileged processes (bsc#1176069).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
The following non-security bugs were fixed:
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).
- amd-xgbe: Add additional dynamic debug messages (git-fixes).
- amd-xgbe: Add additional ethtool statistics (git-fixes).
- amd-xgbe: Add ethtool show/set channels support (git-fixes).
- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).
- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).
- amd-xgbe: Add hardware features debug output (git-fixes).
- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).
- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).
- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).
- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).
- amd-xgbe: Always attempt link training in KR mode (git-fixes).
- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).
- amd-xgbe: Convert to generic power management (git-fixes).
- amd-xgbe: Fix debug output of max channel counts (git-fixes).
- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).
- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).
- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).
- amd-xgbe: fix spelling mistake: 'avialable' -> 'available' (git-fixes).
- amd-xgbe: Handle return code from software reset function (git-fixes).
- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).
- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).
- amd-xgbe: Limit the I2C error messages that are output (git-fixes).
- amd-xgbe: Mark expected switch fall-throughs (git-fixes).
- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).
- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).
- amd-xgbe: Read and save the port property registers during probe (git-fixes).
- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).
- amd-xgbe: remove unnecessary conversion to bool (git-fixes).
- amd-xgbe: Remove use of comm_owned field (git-fixes).
- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).
- amd-xgbe: Simplify the burst length settings (git-fixes).
- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).
- amd-xgbe: Use the proper register during PTP initialization (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (git-fixes).
- bonding: check return value of register_netdevice() in bond_newlink() (git-fixes).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).
- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).
- btrfs: relocation: allow signal to cancel balance (bsc#1174354).
- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- crypto: dh - check validity of Z before export (bsc#1175716).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecdh - check validity of Z before export (bsc#1175716).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- Drivers: net: add missing interrupt.h include (git-fixes).
- Drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- Drop wrongly inserted end-of-sorted marker
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC: Fix reference count leaks (bsc#1112178).
- fbcon: prevent user font height or width change from causing (bsc#1112178)
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- Hide e21a4f3a930c as of its duplication
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- include: add additional sizes (bsc#1094244 ltc#168122).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast() (bsc#1112178).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- lib/mpi: Add mpi_sub_ui() (bsc#1175716).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).
- net: amd: fix return type of ndo_start_xmit function (git-fixes).
- net/amd: Remove useless driver version (git-fixes).
- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).
- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).
- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).
- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- netvsc: unshare skb in VF rx handler (git-fixes).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- Revert 'ALSA: hda: Add support for Loongson 7A1000 controller' (git-fixes).
- Revert 'ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857'
- Revert 'rxrpc: Fix race between recvmsg and sendmsg on immediate call' This reverts commit 04f6b8ac00d839c61b79667685d97a5ecef35a93. We do not enable AF_RXRPC on SLE, but we do on openSUSE (arm 32bit -- why?) kernels. And there, it causes build failures as RXRPC_CALL_DISCONNECTED is not defined in 4.12 yet. So stay on the safe side and drop this.
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'sign also s390x kernel images (bsc#1163524)'
- Revert 'sign also s390x kernel images (bsc#1163524)'
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- sched/deadline: Initialize ->dl_boosted (bsc#1112178).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).
- scsi: libfc: Handling of extra kref (bsc#1175528).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).
- scsi: libfc: Skip additional kref updating work event (bsc#1175528).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- stmmac: Do not access tx_q->dirty_tx before netif_tx_lock (git-fixes).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- Update patch reference for a tipc fix patch (bsc#1175515)
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xgbe: no need to check return value of debugfs_create functions (git-fixes).
- xgbe: switch to more generic VxLAN detection (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2999,SUSE-SLE-RT-12-SP5-2020-2999
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel RT was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2020-14386: Fixed a memory corruption which could have been exploited to gain root privileges from unprivileged processes (bsc#1176069).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).\n- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n\nThe following non-security bugs were fixed:\n\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).\n- amd-xgbe: Add additional dynamic debug messages (git-fixes).\n- amd-xgbe: Add additional ethtool statistics (git-fixes).\n- amd-xgbe: Add ethtool show/set channels support (git-fixes).\n- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).\n- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).\n- amd-xgbe: Add hardware features debug output (git-fixes).\n- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).\n- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).\n- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).\n- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).\n- amd-xgbe: Always attempt link training in KR mode (git-fixes).\n- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).\n- amd-xgbe: Convert to generic power management (git-fixes).\n- amd-xgbe: Fix debug output of max channel counts (git-fixes).\n- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).\n- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).\n- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).\n- amd-xgbe: fix spelling mistake: \u0027avialable\u0027 -\u003e \u0027available\u0027 (git-fixes).\n- amd-xgbe: Handle return code from software reset function (git-fixes).\n- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).\n- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).\n- amd-xgbe: Limit the I2C error messages that are output (git-fixes).\n- amd-xgbe: Mark expected switch fall-throughs (git-fixes).\n- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).\n- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).\n- amd-xgbe: Read and save the port property registers during probe (git-fixes).\n- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).\n- amd-xgbe: remove unnecessary conversion to bool (git-fixes).\n- amd-xgbe: Remove use of comm_owned field (git-fixes).\n- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).\n- amd-xgbe: Simplify the burst length settings (git-fixes).\n- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).\n- amd-xgbe: Use the proper register during PTP initialization (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: Convert pr_\u0026lt;level\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: check error value of register_netdevice() immediately (git-fixes).\n- bonding: check return value of register_netdevice() in bond_newlink() (git-fixes).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).\n- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).\n- btrfs: relocation: allow signal to cancel balance (bsc#1174354).\n- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u0026lt;/foo\u003e\u0027, not \u0027\u0026lt;foo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: dh - check validity of Z before export (bsc#1175716).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecdh - check validity of Z before export (bsc#1175716).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- Drivers: net: add missing interrupt.h include (git-fixes).\n- Drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- Drop wrongly inserted end-of-sorted marker\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC: Fix reference count leaks (bsc#1112178).\n- fbcon: prevent user font height or width change from causing (bsc#1112178) \t\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- Hide e21a4f3a930c as of its duplication\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hippi: Fix a size used in a \u0027pci_free_consistent()\u0027 in an error handling path (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).\n- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).\n- iio: adc: mcp3422: fix locking on error path (git-fixes).\n- iio: adc: mcp3422: fix locking scope (git-fixes).\n- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).\n- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).\n- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: SVM: fix svn_pin_memory()\u0027s use of get_user_pages_fast() (bsc#1112178).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175716).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mlx4: disable device on shutdown (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: amd: fix return type of ndo_start_xmit function (git-fixes).\n- net/amd: Remove useless driver version (git-fixes).\n- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).\n- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).\n- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u0026lt;asm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- Revert \u0027ALSA: hda: Add support for Loongson 7A1000 controller\u0027 (git-fixes).\n- Revert \u0027ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control\u0027 (git-fixes).\n- Revert \u0027i2c: cadence: Fix the hold bit setting\u0027 (git-fixes).\n- Revert \u0027rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857\u0027 \n- Revert \u0027rxrpc: Fix race between recvmsg and sendmsg on immediate call\u0027 This reverts commit 04f6b8ac00d839c61b79667685d97a5ecef35a93. We do not enable AF_RXRPC on SLE, but we do on openSUSE (arm 32bit -- why?) kernels. And there, it causes build failures as RXRPC_CALL_DISCONNECTED is not defined in 4.12 yet. So stay on the safe side and drop this.\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 \n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 \n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u0026lt;aspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1112178).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).\n- scsi: libfc: Handling of extra kref (bsc#1175528).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).\n- scsi: libfc: Skip additional kref updating work event (bsc#1175528).\n- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Add description for lpfc_release_rpi()\u0027s \u0027ndlpl param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).\n- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).\n- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Provide description for lpfc_mem_alloc()\u0027s \u0027align\u0027 param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Remove unused variable \u0027pg_addr\u0027 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- stmmac: Do not access tx_q-\u003edirty_tx before netif_tx_lock (git-fixes).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- vxlan: Ensure FDB dump is performed under RCU (git-fixes).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xgbe: no need to check return value of debugfs_create functions (git-fixes).\n- xgbe: switch to more generic VxLAN detection (git-fixes).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2999,SUSE-SLE-RT-12-SP5-2020-2999", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2999-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2999-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202999-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2999-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174354", "url": "https://bugzilla.suse.com/1174354" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1175528", "url": "https://bugzilla.suse.com/1175528" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175716", "url": "https://bugzilla.suse.com/1175716" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176410", "url": "https://bugzilla.suse.com/1176410" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-22T08:06:37Z", "generator": { "date": "2020-10-22T08:06:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2999-1", "initial_release_date": "2020-10-22T08:06:37Z", "revision_history": [ { "date": "2020-10-22T08:06:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.19.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.19.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.19.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.19.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.19.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.19.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.19.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.19.1.x86_64", "product_id": "kernel-rt-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.19.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.19.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.19.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.19.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.19.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.19.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.19.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.19.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.19.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.19.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.19.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.19.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.19.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T08:06:37Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
suse-su-2020:3230-1
Vulnerability from csaf_suse
Published
2020-11-06 14:36
Modified
2020-11-06 14:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).
- CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#1177121).
- CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#1177511).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-3230,SUSE-SLE-Module-RT-15-SP2-2020-3230
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).\n- CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#1177121).\n- CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#1177511).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- nfs: Fix security label length not being reset (bsc#1176381).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3230,SUSE-SLE-Module-RT-15-SP2-2020-3230", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3230-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3230-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203230-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3230-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-06T14:36:12Z", "generator": { "date": "2020-11-06T14:36:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3230-1", "initial_release_date": "2020-11-06T14:36:12Z", "revision_history": [ { "date": "2020-11-06T14:36:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-13.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-13.1.noarch", "product_id": "kernel-devel-rt-5.3.18-13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-13.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-13.1.noarch", "product_id": "kernel-source-rt-5.3.18-13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-13.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-13.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-13.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt-5.3.18-13.1.x86_64", "product_id": "kernel-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-13.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-13.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-13.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-13.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-13.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-13.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-13.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-13.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-13.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-13.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-13.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-13.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-13.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-13.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-13.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-13.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-13.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP2", "product": { "name": "SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-13.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-13.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-13.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-13.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-13.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-13.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-06T14:36:12Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-06T14:36:12Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-06T14:36:12Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-13.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-13.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-06T14:36:12Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
suse-su-2020:3491-1
Vulnerability from csaf_suse
Published
2020-11-23 16:23
Modified
2020-11-23 16:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- Add CONFIG_CHECK_CODESIGN_EKU
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX && !CONFIG_FS_DAX (bsc#1177817).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a & vs && typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178177).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- USB: core: Solve race condition in anchor cleanup functions (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: dwc3: simple: add support for Hikey 970 (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- USB: xhci-mtk: Fix typo (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- whitespace cleanup
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-3491,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3491
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: Always build evged in (git-fixes).\n- ACPI: button: fix handling lid state changes when input device closed (git-fixes).\n- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).\n- Add CONFIG_CHECK_CODESIGN_EKU\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: ac97: (cosmetic) align argument names (git-fixes).\n- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: asihpi: fix spellint typo in comments (git-fixes).\n- ALSA: atmel: ac97: clarify operator precedence (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda: (cosmetic) align function parameters (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hdspm: Fix typo arbitary (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: portman2x4: fix repeated word \u0027if\u0027 (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: sparc: dbri: fix repeated word \u0027the\u0027 (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).\n- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).\n- ALSA: vx: vx_core: clarify operator precedence (git-fixes).\n- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).\n- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).\n- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- block: Fix page_is_mergeable() for compound pages (bsc#1177814).\n- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).\n- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).\n- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).\n- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: drop path before adding new uuid tree entry (bsc#1178176).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix filesystem corruption after a device replace (bsc#1178395).\n- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).\n- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).\n- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: set the correct lockdep class for new nodes (bsc#1178184).\n- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: promote to unsigned long long before shifting (bsc#1178175).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).\n- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).\n- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).\n- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dax: Fix compilation for CONFIG_DAX \u0026\u0026 !CONFIG_FS_DAX (bsc#1177817).\n- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let\u0027s disable it at building out-of-tree codes\n- Disable module compression on SLE15 SP2 (bsc#1178307)\n- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).\n- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).\n- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).\n- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).\n- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).\n- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).\n- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).\n- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).\n- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).\n- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).\n- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).\n- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).\n- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).\n- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).\n- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).\n- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).\n- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).\n- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).\n- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).\n- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).\n- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).\n- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).\n- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).\n- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).\n- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).\n- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).\n- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).\n- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).\n- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).\n- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).\n- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).\n- dm: Call proper helper to determine dax support (bsc#1177817).\n- dm/dax: Fix table reference counts (bsc#1178246).\n- docs: driver-api: remove a duplicated index entry (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).\n- futex: Consistently use fshared as boolean (bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).\n- futex: Remove put_futex_key() (bsc#1149032).\n- futex: Remove unused or redundant includes (bsc#1149032).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: hid-input: fix stylus battery reporting (git-fixes).\n- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).\n- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- ida: Free allocated bitmap in error path (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: stmfts - fix a \u0026 vs \u0026\u0026 typo (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).\n- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).\n- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).\n- ipvlan: fix device features (networking-stable-20_08_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kABI fix for NFS: Fix flexfiles read failover (git-fixes).\n- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178177).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).\n- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).\n- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: do not panic when links can\u0027t be created in sysfs (bsc#1178002).\n- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).\n- mm: fix a race during THP splitting (bsc#1178255).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: madvise: fix vma user-after-free (git-fixes).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm: replace memmap_context by meminit_context (bsc#1178002).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). \n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- module: Correctly truncate sysfs sections output (git-fixes).\n- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).\n- module: Refactor section attr into bin attribute (git-fixes).\n- module: statically initialize init section freeing data (git-fixes).\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).\n- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).\n- mtd: spinand: gigadevice: Add QE Bit (git-fixes).\n- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).\n- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: dsa: b53: check for timeout (networking-stable-20_08_24).\n- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).\n- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).\n- net: Fix bridge enslavement failure (networking-stable-20_09_24).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).\n- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).\n- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).\n- net: lantiq: Wake TX queue again (networking-stable-20_09_24).\n- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).\n- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).\n- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).\n- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).\n- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nfp: use correct define to return NONE fec (networking-stable-20_09_24).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFS: Fix security label length not being reset (bsc#1176381).\n- NFS: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- overflow: Include header file with SIZE_MAX declaration (git-fixes).\n- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- pwm: img: Fix null pointer access in probe (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).\n- r8169: fix operation under forced interrupt threading (git-fixes).\n- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: rx8010: do not modify the global rtc ops (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- rtw88: increse the size of rx buffer size (git-fixes).\n- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).\n- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- selftests/timers: Turn off timeout setting (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- slimbus: core: check get_addr before removing laddr ida (git-fixes).\n- slimbus: core: do not enter to clock pause mode in core (git-fixes).\n- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).\n- soc: fsl: qbman: Fix return value on success (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: spi-s3c64xx: Check return values (git-fixes).\n- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- taprio: Fix allowing too small intervals (networking-stable-20_09_24).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tracing: Check return value of __create_val_fields() before using its result (git-fixes).\n- tracing: Save normal string variables (git-fixes).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- USB: core: Solve race condition in anchor cleanup functions (git-fixes).\n- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).\n- USB: dwc3: simple: add support for Hikey 970 (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- USB: xhci-mtk: Fix typo (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).\n- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).\n- watchdog: Use put_device on error (git-fixes).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- whitespace cleanup\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755). \n- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).\n- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).\n- x86/ioapic: Unbreak check_timer() (bsc#1152489).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).\n- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xfs: fix high key handling in the rt allocator\u0027s query_range function (git-fixes).\n- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).\n- xfs: force the log after remapping a synchronous-writes file (git-fixes).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3491,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3491", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3491-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3491-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203491-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3491-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-23T16:23:08Z", "generator": { "date": "2020-11-23T16:23:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3491-1", "initial_release_date": "2020-11-23T16:23:08Z", "revision_history": [ { "date": "2020-11-23T16:23:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.24.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.24.1.noarch", "product_id": "kernel-devel-azure-5.3.18-18.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.24.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.24.1.noarch", "product_id": "kernel-source-azure-5.3.18-18.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.24.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-23T16:23:08Z", "details": "moderate" } ], "title": "CVE-2020-27675" } ] }
suse-su-2020:2906-1
Vulnerability from csaf_suse
Published
2020-10-13 13:49
Modified
2020-10-13 13:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).
- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- fbcon: prevent user font height or width change from causing (bsc#1112178) * move from drivers/video/fbdev/fbcon to drivers/video/console * context changes
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- Hide e21a4f3a930c as of its duplication
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- mac802154: tx: fix use-after-free (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2906,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2906
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).\n- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: Convert pr_\u003clevel\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- fbcon: prevent user font height or width change from causing (bsc#1112178) \t* move from drivers/video/fbdev/fbcon to drivers/video/console \t* context changes\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- Hide e21a4f3a930c as of its duplication\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).\n- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).\n- iio: adc: mcp3422: fix locking on error path (git-fixes).\n- iio: adc: mcp3422: fix locking scope (git-fixes).\n- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).\n- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).\n- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- mac802154: tx: fix use-after-free (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u003casm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2906,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2906", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2906-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2906-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202906-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2906-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-13T13:49:20Z", "generator": { "date": "2020-10-13T13:49:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2906-1", "initial_release_date": "2020-10-13T13:49:20Z", "revision_history": [ { "date": "2020-10-13T13:49:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.47.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.47.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.47.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.47.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.47.1.x86_64", "product_id": "kernel-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.47.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.47.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.47.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.47.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.47.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.47.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.47.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.47.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.47.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:49:20Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
suse-su-2020:3014-1
Vulnerability from csaf_suse
Published
2020-10-23 07:33
Modified
2020-10-23 07:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).
- CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#1177121).
- CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#1177511).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-14386: Fixed a memory corruption which could have been exploited to gain root privileges from unprivileged processes (bsc#1176069).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
The following non-security bugs were fixed:
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (git-fixes).
- bonding: check return value of register_netdevice() in bond_newlink() (git-fixes).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC: Fix reference count leaks (bsc#1112178).
- fbcon: prevent user font height or width change from causing (bsc#1112178)
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast() (bsc#1112178).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4: don't mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115)
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698)
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- sched/deadline: Initialize ->dl_boosted (bsc#1112178).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- stmmac: Do not access tx_q->dirty_tx before netif_tx_lock (git-fixes).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
Patchnames
SUSE-2020-3014,SUSE-SLE-Module-RT-15-SP1-2020-3014
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).\n- CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#1177121).\n- CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#1177511).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2020-14386: Fixed a memory corruption which could have been exploited to gain root privileges from unprivileged processes (bsc#1176069).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n\nThe following non-security bugs were fixed:\n\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: Convert pr_\u003clevel\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: check error value of register_netdevice() immediately (git-fixes).\n- bonding: check return value of register_netdevice() in bond_newlink() (git-fixes).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- EDAC: Fix reference count leaks (bsc#1112178).\n- fbcon: prevent user font height or width change from causing (bsc#1112178)\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hippi: Fix a size used in a \u0027pci_free_consistent()\u0027 in an error handling path (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: SVM: fix svn_pin_memory()\u0027s use of get_user_pages_fast() (bsc#1112178).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mlx4: disable device on shutdown (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4: don\u0027t mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (bsc#1174748).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u003casm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115)\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698)\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1112178).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: hisi_sas: Fix a timeout race of driver internal and SMP IO (bsc#1140683).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Add description for lpfc_release_rpi()\u0027s \u0027ndlpl param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).\n- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).\n- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Provide description for lpfc_mem_alloc()\u0027s \u0027align\u0027 param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Remove unused variable \u0027pg_addr\u0027 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Performance tweak (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1176946 bsc#1175520 bsc#1172538).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- stmmac: Do not access tx_q-\u003edirty_tx before netif_tx_lock (git-fixes).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- vxlan: Ensure FDB dump is performed under RCU (git-fixes).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3014,SUSE-SLE-Module-RT-15-SP1-2020-3014", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3014-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3014-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203014-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3014-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1140683", "url": "https://bugzilla.suse.com/1140683" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175520", "url": "https://bugzilla.suse.com/1175520" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176410", "url": "https://bugzilla.suse.com/1176410" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176946", "url": "https://bugzilla.suse.com/1176946" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-23T07:33:43Z", "generator": { "date": "2020-10-23T07:33:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3014-1", "initial_release_date": "2020-10-23T07:33:43Z", "revision_history": [ { "date": "2020-10-23T07:33:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.36.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.36.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.36.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.36.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.36.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.36.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.36.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.36.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.36.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.36.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.36.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.36.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.36.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.36.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.36.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.36.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.36.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.36.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.36.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.36.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.36.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.36.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-23T07:33:43Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
suse-su-2020:3503-1
Vulnerability from csaf_suse
Published
2020-11-24 13:31
Modified
2020-11-24 13:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).
- CVE-2019-6133: In PolicyKit (aka polkit), the 'start time' protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).
The following non-security bugs were fixed:
- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).
- net/packet: fix overflow in tpacket_rcv (bsc#1176069).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
Patchnames
HPE-Helion-OpenStack-8-2020-3503,SUSE-2020-3503,SUSE-OpenStack-Cloud-8-2020-3503,SUSE-OpenStack-Cloud-Crowbar-8-2020-3503,SUSE-SLE-HA-12-SP3-2020-3503,SUSE-SLE-SAP-12-SP3-2020-3503,SUSE-SLE-SERVER-12-SP3-2020-3503,SUSE-SLE-SERVER-12-SP3-BCL-2020-3503,SUSE-Storage-5-2020-3503
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bug fixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).\n- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).\n- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c, which could have allowed an attacker to cause a denial of service (memory consumption) (bsc#1157298).\n- CVE-2019-6133: In PolicyKit (aka polkit), the \u0027start time\u0027 protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c (bsc#1121872).\n- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).\n\nThe following non-security bugs were fixed:\n\n- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).\n- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1176816).\n- net/packet: fix overflow in tpacket_rcv (bsc#1176069).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-3503,SUSE-2020-3503,SUSE-OpenStack-Cloud-8-2020-3503,SUSE-OpenStack-Cloud-Crowbar-8-2020-3503,SUSE-SLE-HA-12-SP3-2020-3503,SUSE-SLE-SAP-12-SP3-2020-3503,SUSE-SLE-SERVER-12-SP3-2020-3503,SUSE-SLE-SERVER-12-SP3-BCL-2020-3503,SUSE-Storage-5-2020-3503", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3503-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3503-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203503-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3503-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1083244", "url": "https://bugzilla.suse.com/1083244" }, { "category": "self", "summary": "SUSE Bug 1121826", "url": "https://bugzilla.suse.com/1121826" }, { "category": "self", "summary": "SUSE Bug 1121872", "url": "https://bugzilla.suse.com/1121872" }, { "category": "self", "summary": "SUSE Bug 1157298", "url": "https://bugzilla.suse.com/1157298" }, { "category": "self", "summary": "SUSE Bug 1160917", "url": "https://bugzilla.suse.com/1160917" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176253", "url": "https://bugzilla.suse.com/1176253" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176382", "url": "https://bugzilla.suse.com/1176382" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176816", "url": "https://bugzilla.suse.com/1176816" }, { "category": "self", "summary": "SUSE Bug 1176896", "url": "https://bugzilla.suse.com/1176896" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177165", "url": "https://bugzilla.suse.com/1177165" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177226", "url": "https://bugzilla.suse.com/1177226" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177816", "url": "https://bugzilla.suse.com/1177816" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18204 page", "url": "https://www.suse.com/security/cve/CVE-2017-18204/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19063 page", "url": "https://www.suse.com/security/cve/CVE-2019-19063/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6133 page", "url": "https://www.suse.com/security/cve/CVE-2019-6133/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-24T13:31:53Z", "generator": { "date": "2020-11-24T13:31:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3503-1", "initial_release_date": "2020-11-24T13:31:53Z", "revision_history": [ { "date": "2020-11-24T13:31:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.135.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.135.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.135.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.135.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.135.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.135.1.aarch64", "product_id": "kernel-default-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.135.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.135.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.135.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.135.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.135.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.135.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.135.1.aarch64", "product_id": "kernel-syms-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.135.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.135.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.135.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.135.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.135.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.135.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.135.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.135.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.135.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.135.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.135.1.noarch", "product_id": "kernel-devel-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.135.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.135.1.noarch", "product_id": "kernel-macros-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.135.1.noarch", "product": { "name": "kernel-source-4.4.180-94.135.1.noarch", "product_id": "kernel-source-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.135.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.135.1.noarch", "product_id": "kernel-docs-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.135.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.135.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.135.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.135.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.135.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.135.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.135.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.135.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.135.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.135.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.135.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.135.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.135.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.135.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.135.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.135.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.135.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.135.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.135.1.ppc64le", "product_id": "kernel-default-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.135.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.135.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.135.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.135.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.135.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.135.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.135.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.135.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.135.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.135.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.135.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.135.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.135.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.135.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.135.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.135.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.135.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.135.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.135.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.135.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.135.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.135.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-4.4.180-94.135.1.s390x", "product_id": "kernel-default-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.135.1.s390x", "product_id": "kernel-default-base-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.135.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.135.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.135.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.135.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.135.1.s390x", "product_id": "kernel-default-man-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.135.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.135.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.135.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.135.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.135.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.135.1.s390x", "product_id": "kernel-syms-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.135.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.135.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.135.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.135.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.135.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.135.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.135.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.135.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.135.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.135.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.135.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.135.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.135.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.135.1.x86_64", "product_id": "kernel-default-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.135.1.x86_64", "product_id": "kernel-syms-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.135.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.135.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.135.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.135.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.135.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.135.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.135.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.135.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.135.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.135.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.135.1.x86_64", "product_id": "kernel-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.135.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.135.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.135.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.135.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.135.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.135.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.135.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.135.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.135.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.135.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.135.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.135.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.135.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.135.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.135.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.135.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.135.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.135.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.135.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.135.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.135.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.135.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.135.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.135.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.135.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.135.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.135.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.135.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.135.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18204" } ], "notes": [ { "category": "general", "text": "The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18204", "url": "https://www.suse.com/security/cve/CVE-2017-18204" }, { "category": "external", "summary": "SUSE Bug 1083244 for CVE-2017-18204", "url": "https://bugzilla.suse.com/1083244" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2017-18204" }, { "cve": "CVE-2019-19063", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19063" } ], "notes": [ { "category": "general", "text": "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19063", "url": "https://www.suse.com/security/cve/CVE-2019-19063" }, { "category": "external", "summary": "SUSE Bug 1157298 for CVE-2019-19063", "url": "https://bugzilla.suse.com/1157298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2019-19063" }, { "cve": "CVE-2019-6133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6133" } ], "notes": [ { "category": "general", "text": "In PolicyKit (aka polkit) 0.115, the \"start time\" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6133", "url": "https://www.suse.com/security/cve/CVE-2019-6133" }, { "category": "external", "summary": "SUSE Bug 1070943 for CVE-2019-6133", "url": "https://bugzilla.suse.com/1070943" }, { "category": "external", "summary": "SUSE Bug 1121826 for CVE-2019-6133", "url": "https://bugzilla.suse.com/1121826" }, { "category": "external", "summary": "SUSE Bug 1121872 for CVE-2019-6133", "url": "https://bugzilla.suse.com/1121872" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2019-6133" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.135.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.135.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.135.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.135.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.135.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_135-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-24T13:31:53Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3532-1
Vulnerability from csaf_suse
Published
2020-11-26 11:49
Modified
2020-11-26 11:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
The following non-security bugs were fixed:
- btrfs: cleanup root usage by btrfs_get_alloc_profile (bsc#1131277).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.
- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/hyperv: Create and use Hyper-V page definitions (bsc#1176877).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
Patchnames
SUSE-2020-3532,SUSE-SLE-Module-Live-Patching-15-2020-3532,SUSE-SLE-Product-HA-15-2020-3532,SUSE-SLE-Product-HPC-15-2020-3532,SUSE-SLE-Product-SLES-15-2020-3532,SUSE-SLE-Product-SLES_SAP-15-2020-3532
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bug fixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).\n- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n\nThe following non-security bugs were fixed:\n\n- btrfs: cleanup root usage by btrfs_get_alloc_profile (bsc#1131277).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366 bsc#1176922).\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.\n- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- x86/hyperv: Create and use Hyper-V page definitions (bsc#1176877).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1058115 bsc#1176907).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3532,SUSE-SLE-Module-Live-Patching-15-2020-3532,SUSE-SLE-Product-HA-15-2020-3532,SUSE-SLE-Product-HPC-15-2020-3532,SUSE-SLE-Product-SLES-15-2020-3532,SUSE-SLE-Product-SLES_SAP-15-2020-3532", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3532-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3532-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203532-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3532-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161360", "url": "https://bugzilla.suse.com/1161360" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173233", "url": "https://bugzilla.suse.com/1173233" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176922", "url": "https://bugzilla.suse.com/1176922" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177165", "url": "https://bugzilla.suse.com/1177165" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177226", "url": "https://bugzilla.suse.com/1177226" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177513", "url": "https://bugzilla.suse.com/1177513" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1178003", "url": "https://bugzilla.suse.com/1178003" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-26T11:49:26Z", "generator": { "date": "2020-11-26T11:49:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3532-1", "initial_release_date": "2020-11-26T11:49:26Z", "revision_history": [ { "date": "2020-11-26T11:49:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.63.1.aarch64", "product_id": "kernel-syms-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.63.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.63.1.noarch", "product_id": "kernel-devel-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.63.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.63.1.noarch", "product_id": "kernel-docs-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.63.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.63.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.63.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.63.1.noarch", "product_id": "kernel-macros-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.63.1.noarch", "product": { "name": "kernel-source-4.12.14-150.63.1.noarch", "product_id": "kernel-source-4.12.14-150.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.63.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.63.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.63.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-4.12.14-150.63.1.s390x", "product_id": "kernel-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.63.1.s390x", "product_id": "kernel-default-base-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.63.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.63.1.s390x", "product_id": "kernel-default-man-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.63.1.s390x", "product_id": "kernel-syms-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.63.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.63.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.63.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.63.1.x86_64", "product_id": "kernel-syms-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-27675" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T11:49:26Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:3544-1
Vulnerability from csaf_suse
Published
2020-11-26 15:53
Modified
2020-11-26 15:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bug fixes.
The following security bugs were fixed:
- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a UAF in the fast user mutex (futex) wait operation (bsc#1176011).
- CVE-2020-25643: Fixed an improper input validation in the ppp_cp_parse_cr function of the HDLC_PPP module (bnc#1177206).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
The following non-security bugs were fixed:
- btrfs: remove root usage from can_overcommit (bsc#1131277).
- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).
- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.
- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.
- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
Patchnames
SUSE-2020-3544,SUSE-OpenStack-Cloud-9-2020-3544,SUSE-OpenStack-Cloud-Crowbar-9-2020-3544,SUSE-SLE-HA-12-SP4-2020-3544,SUSE-SLE-Live-Patching-12-SP4-2020-3544,SUSE-SLE-SAP-12-SP4-2020-3544,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3544
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bug fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2020-0430: Fixed an OOB read in skb_headlen of /include/linux/skbuff.h (bnc#1176723).\n- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).\n- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).\n- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 (bsc#1177725).\n- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).\n- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).\n- CVE-2020-14381: Fixed a UAF in the fast user mutex (futex) wait operation (bsc#1176011).\n- CVE-2020-25643: Fixed an improper input validation in the ppp_cp_parse_cr function of the HDLC_PPP module (bnc#1177206).\n- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).\n\nThe following non-security bugs were fixed:\n\n- btrfs: remove root usage from can_overcommit (bsc#1131277).\n- hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816).\n- hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.\n- livepatch: Test if -fdump-ipa-clones is really available As of now we add -fdump-ipa-clones unconditionally. It does not cause a trouble if the kernel is build with the supported toolchain. Otherwise it could fail easily. Do the correct thing and test for the availability.\n- NFS: On fatal writeback errors, we need to call nfs_inode_remove_request() (bsc#1177340).\n- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).\n- NFS: Revalidate the file mapping on all fatal writeback errors (bsc#1177340).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- powerpc/pseries/cpuidle: add polling idle for shared processor guests (bsc#1178765 ltc#188968).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1173233).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1173233).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3544,SUSE-OpenStack-Cloud-9-2020-3544,SUSE-OpenStack-Cloud-Crowbar-9-2020-3544,SUSE-SLE-HA-12-SP4-2020-3544,SUSE-SLE-Live-Patching-12-SP4-2020-3544,SUSE-SLE-SAP-12-SP4-2020-3544,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3544", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3544-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3544-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203544-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3544-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1131277", "url": "https://bugzilla.suse.com/1131277" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173233", "url": "https://bugzilla.suse.com/1173233" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176723", "url": "https://bugzilla.suse.com/1176723" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176922", "url": "https://bugzilla.suse.com/1176922" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177027", "url": "https://bugzilla.suse.com/1177027" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177340", "url": "https://bugzilla.suse.com/1177340" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177816", "url": "https://bugzilla.suse.com/1177816" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178765", "url": "https://bugzilla.suse.com/1178765" }, { "category": "self", "summary": "SUSE Bug 1178782", "url": "https://bugzilla.suse.com/1178782" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0430 page", "url": "https://www.suse.com/security/cve/CVE-2020-0430/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27673 page", "url": "https://www.suse.com/security/cve/CVE-2020-27673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27675 page", "url": "https://www.suse.com/security/cve/CVE-2020-27675/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-26T15:53:57Z", "generator": { "date": "2020-11-26T15:53:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3544-1", "initial_release_date": "2020-11-26T15:53:57Z", "revision_history": [ { "date": "2020-11-26T15:53:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.65.1.aarch64", "product_id": "kernel-syms-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.65.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.65.1.noarch", "product_id": "kernel-devel-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.65.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.65.1.noarch", "product_id": "kernel-docs-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.65.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.65.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.65.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.65.1.noarch", "product_id": "kernel-macros-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.65.1.noarch", "product": { "name": "kernel-source-4.12.14-95.65.1.noarch", "product_id": "kernel-source-4.12.14-95.65.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.65.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.65.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.65.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-4.12.14-95.65.1.s390x", "product_id": "kernel-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.65.1.s390x", "product_id": "kernel-default-base-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.65.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.65.1.s390x", "product_id": "kernel-default-man-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.65.1.s390x", "product_id": "kernel-syms-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.65.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.65.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.65.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.65.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.65.1.x86_64", "product_id": "kernel-syms-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.65.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.65.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.65.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0430" } ], "notes": [ { "category": "general", "text": "In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0430", "url": "https://www.suse.com/security/cve/CVE-2020-0430" }, { "category": "external", "summary": "SUSE Bug 1176723 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1176723" }, { "category": "external", "summary": "SUSE Bug 1178003 for CVE-2020-0430", "url": "https://bugzilla.suse.com/1178003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0430" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27673" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27673", "url": "https://www.suse.com/security/cve/CVE-2020-27673" }, { "category": "external", "summary": "SUSE Bug 1177411 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1177411" }, { "category": "external", "summary": "SUSE Bug 1184583 for CVE-2020-27673", "url": "https://bugzilla.suse.com/1184583" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-27673" }, { "cve": "CVE-2020-27675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27675" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27675", "url": "https://www.suse.com/security/cve/CVE-2020-27675" }, { "category": "external", "summary": "SUSE Bug 1177410 for CVE-2020-27675", "url": "https://bugzilla.suse.com/1177410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-27675" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.65.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.65.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.65.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T15:53:57Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
suse-su-2020:2904-1
Vulnerability from csaf_suse
Published
2020-10-13 13:47
Modified
2020-10-13 13:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).
- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).
- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).
- btrfs: relocation: allow signal to cancel balance (bsc#1174354).
- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- crypto: dh - check validity of Z before export (bsc#1175716).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).
- crypto: ecdh - check validity of Z before export (bsc#1175716).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- fbcon: prevent user font height or width change from causing (bsc#1112178) * move from drivers/video/fbdev/fbcon to drivers/video/console * context changes
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- lib/mpi: Add mpi_sub_ui() (bsc#1175716).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- mac802154: tx: fix use-after-free (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).
- scsi: libfc: Handling of extra kref (bsc#1175528).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).
- scsi: libfc: Skip additional kref updating work event (bsc#1175528).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- stmmac: Do not access tx_q->dirty_tx before netif_tx_lock (git-fixes).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
SUSE-2020-2904,SUSE-SLE-HA-12-SP5-2020-2904,SUSE-SLE-Live-Patching-12-SP5-2020-2904,SUSE-SLE-SDK-12-SP5-2020-2904,SUSE-SLE-SERVER-12-SP5-2020-2904,SUSE-SLE-WE-12-SP5-2020-2904
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).\n- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2019-25643: Fixed an improper input validation in ppp_cp_parse_cr function which could have led to memory corruption and read overflow (bsc#1177206).\n- CVE-2020-25641: Fixed ann issue where length bvec was causing softlockups (bsc#1177121).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: Convert pr_\u003clevel\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: avoid possible signal interruption of btrfs_drop_snapshot() on relocation tree (bsc#1174354).\n- btrfs: balance: print to system log when balance ends or is paused (bsc#1174354).\n- btrfs: relocation: allow signal to cancel balance (bsc#1174354).\n- btrfs: relocation: review the call sites which can be interrupted by signal (bsc#1174354).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: take overcommit into account in inc_block_group_ro (bsc#1174354).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- crypto: dh - check validity of Z before export (bsc#1175716).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175716).\n- crypto: ecdh - check validity of Z before export (bsc#1175716).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- Drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- fbcon: prevent user font height or width change from causing (bsc#1112178) \t* move from drivers/video/fbdev/fbcon to drivers/video/console \t* context changes\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).\n- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).\n- iio: adc: mcp3422: fix locking on error path (git-fixes).\n- iio: adc: mcp3422: fix locking scope (git-fixes).\n- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).\n- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).\n- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kernel-binary.spec.in: SLE12 tar does not understand --verbatim-files-from\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175716).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- mac802154: tx: fix use-after-free (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u003casm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: libfc: free skb when receiving invalid flogi resp (bsc#1175528).\n- scsi: libfc: Handling of extra kref (bsc#1175528).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1175528).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1175528).\n- scsi: libfc: Skip additional kref updating work event (bsc#1175528).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- SMB3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- stmmac: Do not access tx_q-\u003edirty_tx before netif_tx_lock (git-fixes).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- USB: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- USB: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- USB: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- USB: uas: Add quirk for PNY Pro Elite (git-fixes).\n- USB: UAS: fix disconnect by unplugging a hub (git-fixes).\n- USB: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2904,SUSE-SLE-HA-12-SP5-2020-2904,SUSE-SLE-Live-Patching-12-SP5-2020-2904,SUSE-SLE-SDK-12-SP5-2020-2904,SUSE-SLE-SERVER-12-SP5-2020-2904,SUSE-SLE-WE-12-SP5-2020-2904", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2904-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2904-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202904-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2904-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174354", "url": "https://bugzilla.suse.com/1174354" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175528", "url": "https://bugzilla.suse.com/1175528" }, { "category": "self", "summary": "SUSE Bug 1175716", "url": "https://bugzilla.suse.com/1175716" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-13T13:47:05Z", "generator": { "date": "2020-10-13T13:47:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2904-1", "initial_release_date": "2020-10-13T13:47:05Z", "revision_history": [ { "date": "2020-10-13T13:47:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.41.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.41.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.41.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.41.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.41.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.41.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.41.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.41.1.aarch64", "product_id": "kernel-syms-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.41.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.41.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.41.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.41.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.41.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.41.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.41.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.41.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.41.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.41.1.noarch", "product_id": "kernel-devel-4.12.14-122.41.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.41.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.41.1.noarch", "product_id": "kernel-docs-4.12.14-122.41.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.41.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.41.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.41.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.41.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.41.1.noarch", "product_id": "kernel-macros-4.12.14-122.41.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.41.1.noarch", "product": { "name": "kernel-source-4.12.14-122.41.1.noarch", "product_id": "kernel-source-4.12.14-122.41.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.41.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.41.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.41.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.41.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.41.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.41.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.41.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.41.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.41.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.41.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.41.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.41.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.41.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.41.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.41.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.41.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.41.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.41.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.41.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.41.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.41.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-4.12.14-122.41.1.s390x", "product_id": "kernel-default-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.41.1.s390x", "product_id": "kernel-default-base-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.41.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.41.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.41.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.41.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.41.1.s390x", "product_id": "kernel-default-man-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.41.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.41.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.41.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.41.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.41.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.41.1.s390x", "product_id": "kernel-syms-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.41.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.41.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.41.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.41.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.41.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.41.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.41.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.41.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.41.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.41.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.41.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.41.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.41.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.41.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.41.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.41.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.41.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.41.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.41.1.x86_64", "product_id": "kernel-debug-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.41.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.41.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.41.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.41.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.41.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.41.1.x86_64", "product_id": "kernel-syms-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.41.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.41.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.41.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.41.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.41.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.41.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.41.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-13T13:47:05Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
fkie_cve-2020-25641
Vulnerability from fkie_nvd
Published
2020-10-06 14:15
Modified
2024-11-21 05:18
Severity ?
Summary
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2020/10/06/9 | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1881424 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124 | Mailing List, Patch, Vendor Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/4576-1/ | Third Party Advisory | |
secalert@redhat.com | https://www.kernel.org/doc/html/latest/block/biovecs.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/10/06/9 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1881424 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124 | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4576-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kernel.org/doc/html/latest/block/biovecs.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
linux | linux_kernel | 5.9.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 | |
opensuse | leap | 15.1 | |
opensuse | leap | 15.2 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 20.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB3FD8E8-06B6-4E73-9337-49E751C7FD04", "versionEndIncluding": "5.8.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2C150C3-165E-42D6-80D4-87B11340B08C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "21F51360-AF61-433B-9FD9-D7DE742FABF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AFF43A64-F1B2-49B5-9B1A-3C5287E30CC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7CD5DFA0-15FB-44C2-8C2F-DCABACB998B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DEA3DDD5-5114-44C0-8805-0A0579BB0034", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "573B49F4-C6E1-4032-B46F-70506FE98562", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "78F80706-7471-472D-B9A8-ABDB3C714B4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en la implementaci\u00f3n de biovecs del kernel de Linux en versiones anteriores a 5.9-rc7.\u0026#xa0;Una petici\u00f3n de biovec de longitud cero emitida por el subsistema de bloques podr\u00eda causar que el Kernel entre en un bucle infinito, causando una denegaci\u00f3n de servicio.\u0026#xa0;Este fallo permite a un atacante local con privilegios b\u00e1sicos emitir peticiones a un dispositivo de bloqueo, resultando en una denegaci\u00f3n de servicio.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema" } ], "id": "CVE-2020-25641", "lastModified": "2024-11-21T05:18:18.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T14:15:12.603", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4576-1/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4576-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2020:2112-1
Vulnerability from csaf_opensuse
Published
2020-11-29 15:25
Modified
2020-11-29 15:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).
- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).
- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).
- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-25668: Make FONTX ioctl use the tty pointer they were actually passed (bsc#1178123).
- CVE-2020-25656: Extend func_buf_lock to readers (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812 (bnc#1176485).
- CVE-2020-14351: Fixed race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restrict energy meter to root access (bsc#1170415).
- CVE-2020-16120: Check permission to open real file in overlayfs (bsc#1177470).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- Add CONFIG_CHECK_CODESIGN_EKU
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -> 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx->dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi->io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX && !CONFIG_FS_DAX (bsc#1177817).
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- exfat: fix wrong size update of stream entry by typo (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter->mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a & vs && typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- libceph: clear con->out_msg on Policy::stateful_server faults (bsc#1178177).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband->bitrates in rates (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- Move upstreamed BT patch into sorted section
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb->protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb->data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode->i_io_list with inode->i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
openSUSE-2020-2112
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).\n- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).\n- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).\n- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).\n- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).\n- CVE-2020-25668: Make FONTX ioctl use the tty pointer they were actually passed (bsc#1178123).\n- CVE-2020-25656: Extend func_buf_lock to readers (bnc#1177766).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812 (bnc#1176485).\n- CVE-2020-14351: Fixed race in the perf_mmap_close() function (bsc#1177086).\n- CVE-2020-8694: Restrict energy meter to root access (bsc#1170415).\n- CVE-2020-16120: Check permission to open real file in overlayfs (bsc#1177470).\n- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: Always build evged in (git-fixes).\n- ACPI: button: fix handling lid state changes when input device closed (git-fixes).\n- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).\n- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).\n- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- ACPI / extlog: Check for RDMSR failure (git-fixes).\n- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).\n- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).\n- Add CONFIG_CHECK_CODESIGN_EKU\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: ac97: (cosmetic) align argument names (git-fixes).\n- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: asihpi: fix spellint typo in comments (git-fixes).\n- ALSA: atmel: ac97: clarify operator precedence (git-fixes).\n- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).\n- ALSA: compress_offload: remove redundant initialization (git-fixes).\n- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).\n- ALSA: core: pcm: simplify locking for timers (git-fixes).\n- ALSA: core: timer: clarify operator precedence (git-fixes).\n- ALSA: core: timer: remove redundant assignment (git-fixes).\n- ALSA: ctl: Workaround for lockdep warning wrt card-\u003ectl_files_rwlock (git-fixes).\n- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: fix kernel-doc markups (git-fixes).\n- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).\n- ALSA: hda: (cosmetic) align function parameters (git-fixes).\n- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).\n- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).\n- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).\n- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).\n- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).\n- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).\n- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).\n- ALSA: hda/realtek - Fixed HP headset Mic can\u0027t be detected (git-fixes).\n- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).\n- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).\n- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).\n- ALSA: hdspm: Fix typo arbitary (git-fixes).\n- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).\n- ALSA: portman2x4: fix repeated word \u0027if\u0027 (git-fixes).\n- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).\n- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).\n- ALSA: sparc: dbri: fix repeated word \u0027the\u0027 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: endpoint.c: fix repeated word \u0027there\u0027 (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027Frequence\u0027 -\u003e \u0027Frequency\u0027 (git-fixes).\n- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).\n- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).\n- ALSA: vx: vx_core: clarify operator precedence (git-fixes).\n- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).\n- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).\n- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).\n- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).\n- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).\n- ASoC: qcom: sdm845: set driver name correctly (git-fixes).\n- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).\n- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ata: sata_rcar: Fix DMA boundary mask (git-fixes).\n- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: Fix the size used in a \u0027dma_free_coherent()\u0027 call in an error handling path (git-fixes).\n- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).\n- ath10k: provide survey info as accumulated data (git-fixes).\n- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).\n- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).\n- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).\n- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).\n- blk-mq: order adding requests to hctx-\u003edispatch and checking SCHED_RESTART (bsc#1177750).\n- block: ensure bdi-\u003eio_pages is always initialized (bsc#1177749).\n- block: Fix page_is_mergeable() for compound pages (bsc#1177814).\n- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).\n- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).\n- Bluetooth: Only mark socket zapped after unlocking (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).\n- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).\n- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).\n- brcmfmac: check ndev pointer (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).\n- btrfs: Account for merged patches upstream Move below patches to sorted section.\n- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).\n- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: cleanup cow block on error (bsc#1178584).\n- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: drop path before adding new uuid tree entry (bsc#1178176).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- btrfs: fix filesystem corruption after a device replace (bsc#1178395).\n- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).\n- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).\n- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).\n- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: reschedule if necessary when logging directory items (bsc#1178585).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).\n- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).\n- btrfs: set the correct lockdep class for new nodes (bsc#1178184).\n- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).\n- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).\n- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).\n- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).\n- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).\n- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).\n- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).\n- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).\n- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).\n- can: peak_usb: add range checking in decode operations (git-fixes).\n- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).\n- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).\n- can: softing: softing_card_shutdown(): add braces around empty body in an \u0027if\u0027 statement (git-fixes).\n- ceph: promote to unsigned long long before shifting (bsc#1178175).\n- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).\n- clk: at91: remove the checking of parent_name (git-fixes).\n- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).\n- clk: imx8mq: Fix usdhc parents order (git-fixes).\n- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).\n- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).\n- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: ccp - fix error handling (git-fixes).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).\n- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).\n- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dax: Fix compilation for CONFIG_DAX \u0026\u0026 !CONFIG_FS_DAX (bsc#1177817).\n- Disable module compression on SLE15 SP2 (bsc#1178307)\n- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).\n- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).\n- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).\n- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).\n- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).\n- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).\n- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).\n- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).\n- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).\n- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).\n- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).\n- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).\n- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).\n- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).\n- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).\n- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).\n- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).\n- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).\n- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).\n- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).\n- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).\n- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).\n- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).\n- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).\n- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).\n- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).\n- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).\n- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).\n- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).\n- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).\n- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).\n- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).\n- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).\n- dm: Call proper helper to determine dax support (bsc#1177817).\n- dm/dax: Fix table reference counts (bsc#1178246).\n- docs: driver-api: remove a duplicated index entry (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).\n- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).\n- exfat: fix name_hash computation on big endian systems (git-fixes).\n- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).\n- exfat: fix possible memory leak in exfat_find() (git-fixes).\n- exfat: fix use of uninitialized spinlock on error path (git-fixes).\n- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).\n- exfat: fix wrong size update of stream entry by typo (git-fixes).\n- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).\n- futex: Consistently use fshared as boolean (bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).\n- futex: Remove put_futex_key() (bsc#1149032).\n- futex: Remove unused or redundant includes (bsc#1149032).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).\n- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).\n- HID: hid-input: fix stylus battery reporting (git-fixes).\n- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).\n- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).\n- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).\n- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).\n- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).\n- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).\n- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).\n- ibmvnic: save changed mac address to adapter-\u003emac_addr (bsc#1134760 ltc#177449 git-fixes).\n- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).\n- icmp: randomize the global rate limiter (git-fixes).\n- ida: Free allocated bitmap in error path (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).\n- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).\n- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).\n- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).\n- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).\n- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).\n- ima: Do not ignore errors from crypto_shash_update() (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).\n- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).\n- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).\n- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).\n- Input: stmfts - fix a \u0026 vs \u0026\u0026 typo (git-fixes).\n- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).\n- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).\n- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).\n- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).\n- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).\n- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).\n- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).\n- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).\n- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).\n- ipvlan: fix device features (networking-stable-20_08_24).\n- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).\n- kbuild: enforce -Werror=return-type (bsc#1177281).\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).\n- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- leds: mt6323: move period calculation (git-fixes).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- libceph: clear con-\u003eout_msg on Policy::stateful_server faults (bsc#1178177).\n- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: handle lack of sband-\u003ebitrates in rates (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- mailbox: avoid timer start from callback (git-fixes).\n- media: ati_remote: sanity check for both endpoints (git-fixes).\n- media: bdisp: Fix runtime PM imbalance on error (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).\n- media: exynos4-is: Fix a reference count leak (git-fixes).\n- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).\n- media: firewire: fix memory leak (git-fixes).\n- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).\n- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).\n- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).\n- media: imx274: fix frame interval handling (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: media/pci: prevent memory leak in bttv_probe (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: platform: Improve queue set up flow for bug fixing (git-fixes).\n- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).\n- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: saa7134: avoid a shift overflow (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).\n- media: sti: Fix reference count leaks (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).\n- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).\n- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).\n- media: vsp1: Fix runtime PM imbalance on error (git-fixes).\n- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).\n- memory: omap-gpmc: Fix a couple off by ones (git-fixes).\n- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mfd: sm501: Fix leaks in probe() (git-fixes).\n- mic: vop: copy data to kernel space then write to io memory (git-fixes).\n- misc: mic: scif: Fix error handling path (git-fixes).\n- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).\n- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm: do not panic when links can\u0027t be created in sysfs (bsc#1178002).\n- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).\n- mm: fix a race during THP splitting (bsc#1178255).\n- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: madvise: fix vma user-after-free (git-fixes).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).\n- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).\n- mm: replace memmap_context by meminit_context (bsc#1178002).\n- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).\n- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).\n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).\n- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).\n- module: Correctly truncate sysfs sections output (git-fixes).\n- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).\n- module: Refactor section attr into bin attribute (git-fixes).\n- module: statically initialize init section freeing data (git-fixes).\n- Move upstreamed BT patch into sorted section\n- Move upstreamed intel-vbtn patch into sorted section\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).\n- mtd: lpddr: fix excessive stack usage with clang (git-fixes).\n- mtd: mtdoops: Do not write panic data twice (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).\n- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).\n- mtd: spinand: gigadevice: Add QE Bit (git-fixes).\n- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).\n- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).\n- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).\n- mwifiex: fix double free (git-fixes).\n- mwifiex: remove function pointer check (git-fixes).\n- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).\n- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).\n- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).\n- net: disable netpoll on fresh napis (networking-stable-20_09_11).\n- net: dsa: b53: check for timeout (networking-stable-20_08_24).\n- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).\n- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).\n- net: Fix bridge enslavement failure (networking-stable-20_09_24).\n- net: Fix potential wrong skb-\u003eprotocol in skb_vlan_untag() (networking-stable-20_08_24).\n- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).\n- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).\n- netlabel: fix problems with mapping removal (networking-stable-20_09_11).\n- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).\n- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).\n- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).\n- net: lantiq: Wake TX queue again (networking-stable-20_09_24).\n- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).\n- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).\n- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).\n- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).\n- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).\n- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).\n- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).\n- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).\n- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).\n- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).\n- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).\n- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).\n- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).\n- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).\n- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).\n- nfp: use correct define to return NONE fec (networking-stable-20_09_24).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- nfs: ensure correct writeback errors are returned on close() (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- nfs: Fix security label length not being reset (bsc#1176381).\n- nfs: nfs_file_write() should check for writeback errors (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- nl80211: fix non-split wiphy information (git-fixes).\n- NTB: hw: amd: fix an issue about leak system resources (git-fixes).\n- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).\n- nvme-rdma: fix crash when connect rejected (bsc#1174748).\n- overflow: Include header file with SIZE_MAX declaration (git-fixes).\n- p54: avoid accessing the data mapped to streaming DMA (git-fixes).\n- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).\n- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).\n- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).\n- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).\n- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.\n- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).\n- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).\n- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).\n- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).\n- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).\n- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).\n- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).\n- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).\n- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).\n- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).\n- power: supply: bq27xxx: report \u0027not charging\u0027 on all types (git-fixes).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).\n- pwm: img: Fix null pointer access in probe (git-fixes).\n- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).\n- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).\n- r8169: fix operation under forced interrupt threading (git-fixes).\n- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).\n- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: rx8010: do not modify the global rtc ops (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- rtl8xxxu: prevent potential memory leak (git-fixes).\n- rtw88: increse the size of rx buffer size (git-fixes).\n- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).\n- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).\n- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).\n- selftests/timers: Turn off timeout setting (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- slimbus: core: check get_addr before removing laddr ida (git-fixes).\n- slimbus: core: do not enter to clock pause mode in core (git-fixes).\n- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).\n- soc: fsl: qbman: Fix return value on success (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: spi-s3c64xx: Check return values (git-fixes).\n- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).\n- staging: octeon: repair \u0027fixed-link\u0027 support (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- taprio: Fix allowing too small intervals (networking-stable-20_09_24).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).\n- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).\n- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).\n- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).\n- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).\n- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).\n- tipc: fix uninit skb-\u003edata in tipc_nl_compat_dumpit() (networking-stable-20_08_24).\n- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).\n- tracing: Check return value of __create_val_fields() before using its result (git-fixes).\n- tracing: Save normal string variables (git-fixes).\n- tty: ipwireless: fix error handling (git-fixes).\n- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).\n- uio: free uio id after uio file node is freed (git-fixes).\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)\n- USB: adutux: fix debugging (git-fixes).\n- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).\n- usb: cdc-acm: fix cooldown mechanism (git-fixes).\n- USB: cdc-acm: handle broken union descriptors (git-fixes).\n- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).\n- usb: core: Solve race condition in anchor cleanup functions (git-fixes).\n- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).\n- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).\n- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).\n- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).\n- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).\n- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).\n- usb: dwc3: simple: add support for Hikey 970 (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).\n- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).\n- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).\n- usb: ohci: Default to per-port over-current protection (git-fixes).\n- USB: serial: cyberjack: fix write-URB completion race (git-fixes).\n- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).\n- USB: serial: option: add Cellient MPL200 card (git-fixes).\n- USB: serial: option: Add Telit FT980-KS composition (git-fixes).\n- USB: serial: pl2303: add device-id for HP GC device (git-fixes).\n- USB: serial: qcserial: fix altsetting probing (git-fixes).\n- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).\n- usb: xhci-mtk: Fix typo (git-fixes).\n- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).\n- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).\n- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).\n- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).\n- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).\n- watchdog: Use put_device on error (git-fixes).\n- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1177755).\n- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).\n- writeback: Protect inode-\u003ei_io_list with inode-\u003ei_lock (bsc#1177755).\n- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).\n- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).\n- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).\n- x86/ioapic: Unbreak check_timer() (bsc#1152489).\n- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).\n- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).\n- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/events: add a new \u0027late EOI\u0027 evtchn framework (XSA-332 bsc#1177411).\n- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).\n- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).\n- xen/events: block rogue events for some time (XSA-332 bsc#1177411).\n- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).\n- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).\n- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).\n- xen/gntdev.c: Mark pages as dirty (bsc#1065600).\n- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).\n- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).\n- xfs: do not update mtime on COW faults (bsc#1167030).\n- xfs: fix high key handling in the rt allocator\u0027s query_range function (git-fixes).\n- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).\n- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).\n- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).\n- xfs: force the log after remapping a synchronous-writes file (git-fixes).\n- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).\n- xfs: limit entries returned when counting fsmap records (git-fixes).\n- xfs: remove unused variable \u0027done\u0027 (bsc#1166166).\n- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).\n- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).\n- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-2112", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2112-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:2112-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:2112-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-11-29T15:25:26Z", "generator": { "date": "2020-11-29T15:25:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:2112-1", "initial_release_date": "2020-11-29T15:25:26Z", "revision_history": [ { "date": "2020-11-29T15:25:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product_id": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.50.1.lp152.8.10.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.50.1.lp152.8.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-29T15:25:26Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2020:1655-1
Vulnerability from csaf_opensuse
Published
2020-10-11 13:53
Modified
2020-10-11 13:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25212: Fixed nfs getxattr kernel panic and memory overflow that could lead to crashes or privilege escalations (bsc#1176381).
- CVE-2020-14381: Fixed inode life-time issue in futex handling (bsc#1176011).
- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).
- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).
- CVE-2020-26088: A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a (bnc#1176990).
- CVE-2020-14390: When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1176235 bnc#1176278).
- CVE-2020-0432: In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176721).
- CVE-2020-0427: In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176725).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176722).
- CVE-2020-0404: In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176423).
- CVE-2020-25284: The rbd block device driver in drivers/block/rbd.c used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe (bnc#1176482).
- CVE-2020-14386: Memory corruption in af_apcket can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bnc#1176069).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- Add de2b41be8fcc x86, vmlinux.lds: Page-align end of ..page_aligned sections
- Add f29dfa53cc8a x86/bugs/multihit: Fix mitigation reporting when VMX is not in use
- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- altera-stapl: altera_get_note: prevent write beyond end of 'key' (git-fixes).
- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).
- amd-xgbe: Add additional dynamic debug messages (git-fixes).
- amd-xgbe: Add additional ethtool statistics (git-fixes).
- amd-xgbe: Add ethtool show/set channels support (git-fixes).
- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).
- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).
- amd-xgbe: Add hardware features debug output (git-fixes).
- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).
- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).
- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).
- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).
- amd-xgbe: Always attempt link training in KR mode (git-fixes).
- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).
- amd-xgbe: Convert to generic power management (git-fixes).
- amd-xgbe: Fix debug output of max channel counts (git-fixes).
- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).
- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).
- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).
- amd-xgbe: fix spelling mistake: 'avialable' -> 'available' (git-fixes).
- amd-xgbe: Handle return code from software reset function (git-fixes).
- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).
- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).
- amd-xgbe: Limit the I2C error messages that are output (git-fixes).
- amd-xgbe: Mark expected switch fall-throughs (git-fixes).
- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).
- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).
- amd-xgbe: Prevent looping forever if timestamp update fails (git-fixes).
- amd-xgbe: Read and save the port property registers during probe (git-fixes).
- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).
- amd-xgbe: remove unnecessary conversion to bool (git-fixes).
- amd-xgbe: Remove use of comm_owned field (git-fixes).
- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).
- amd-xgbe: Simplify the burst length settings (git-fixes).
- amd-xgbe: Update the BelFuse quirk to support SGMII (git-fixes).
- amd-xgbe: Update TSO packet statistics accuracy (git-fixes).
- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).
- amd-xgbe: Use the proper register during PTP initialization (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).
- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).
- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_<level> uses to a more typical style (git fixes (block drivers)).
- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).
- bcm63xx_enet: correct clock usage (git-fixes).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- ceph: do not allow setlease on cephfs (bsc#1177041).
- ceph: fix potential mdsc use-after-free crash (bsc#1177042).
- ceph: fix use-after-free for fsc->mdsc (bsc#1177043).
- ceph: handle zero-length feature mask in session messages (bsc#1177044).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: Add (devm_)clk_get_optional() functions (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).
- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).
- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm: report suspended device during destroy (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm: use noio when sending kobject event (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- drivers: net: add missing interrupt.h include (git-fixes).
- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) * context changes
- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).
- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) * context changes
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (git-fixes).
- drm/sun4i: Fix dsi dcs long write function (git-fixes).
- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC: Fix reference count leaks (bsc#1112178).
- fbcon: prevent user font height or width change from causing (bsc#1112178)
- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).
- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).
- gtp: fix use-after-free in gtp_newlink() (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- include: add additional sizes (bsc#1094244 ltc#168122).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).
- iommu/amd: Fix potential @entry null deref (bsc#1177294).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).
- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).
- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).
- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).
- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).
- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).
- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).
- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).
- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).
- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).
- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).
- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).
- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).
- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).
- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).
- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).
- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).
- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).
- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).
- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).
- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).
- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).
- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).
- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).
- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).
- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).
- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).
- KVM: arm/arm64: Get rid of vcpu->arch.irq_lines (jsc#SLE-4084).
- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).
- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).
- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).
- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).
- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).
- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).
- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).
- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).
- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).
- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).
- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).
- KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast() (bsc#1112178).
- KVM: Take vcpu->mutex outside vcpu_load (jsc#SLE-4084).
- libceph: allow setting abort_on_full for rbd (bsc#1169972).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).
- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.
- mac802154: tx: fix use-after-free (git-fixes).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).
- mm/vmalloc.c: move 'area->pages' after if statement (git fixes (mm/vmalloc)).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix a double free in probe() (git-fixes).
- mtd: phram: fix a double free issue in error path (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).
- net: amd: fix return type of ndo_start_xmit function (git-fixes).
- net/amd: Remove useless driver version (git-fixes).
- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).
- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).
- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).
- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).
- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).
- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).
- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).
- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).
- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).
- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).
- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).
- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).
- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).
- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).
- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).
- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).
- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).
- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).
- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).
- net: mvneta: fix mtu change on port without link (git-fixes).
- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: qca_spi: Avoid packet drop during initial sync (git-fixes).
- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: improve close of terminated socket (git-fixes).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: tolerate future SMCD versions (git-fixes).
- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).
- net: stmmac: Disable ACS Feature for GMAC >= 4 (git-fixes).
- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).
- net: stmmac: dwmac4: fix flow control issue (git-fixes).
- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).
- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).
- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).
- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).
- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).
- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).
- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_rx_desc_resources()' (git-fixes).
- net: stmmac: Fix error handling path in 'alloc_dma_tx_desc_resources()' (git-fixes).
- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).
- net: stmmac: set MSS for each tx DMA channel (git-fixes).
- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).
- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).
- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).
- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).
- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).
- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).
- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).
- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).
- powerpc/64s: Include <asm/nmi.h> header file to fix a warning (bsc#1094244 ltc#168122).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).
- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).
- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).
- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).
- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- Revert 'ALSA: hda: Add support for Loongson 7A1000 controller' (git-fixes).
- Revert 'ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: fnic: Do not call 'scsi_done()' for unhandled commands (bsc#1168468, bsc#1171675).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: free response frame from GPN_ID (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).
- smb3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- smb3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- stmmac: Do not access tx_q->dirty_tx before netif_tx_lock (git-fixes).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).
- usb: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- usb: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- usb: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- usb: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- usb: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- usb: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- usb: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- usb: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).
- usblp: fix race between disconnect() and read() (git-fixes).
- usb: lvtest: return proper error code in probe (git-fixes).
- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).
- usb: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).
- usb: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- usb: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- usb: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- usb: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- usb: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- usb: serial: option: support dynamic Quectel USB compositions (git-fixes).
- usb: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- usb: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- usb: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- usb: uas: Add quirk for PNY Pro Elite (git-fixes).
- usb: UAS: fix disconnect by unplugging a hub (git-fixes).
- usb: yurex: Fix bad gfp argument (git-fixes).
- vgacon: remove software scrollback support (bsc#1176278).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- vrf: prevent adding upper devices (git-fixes).
- vxge: fix return of a free'd memblock on a failed dma mapping (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xgbe: no need to check return value of debugfs_create functions (git-fixes).
- xgbe: switch to more generic VxLAN detection (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
openSUSE-2020-1655
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25212: Fixed nfs getxattr kernel panic and memory overflow that could lead to crashes or privilege escalations (bsc#1176381).\n- CVE-2020-14381: Fixed inode life-time issue in futex handling (bsc#1176011).\n- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).\n- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).\n- CVE-2020-26088: A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a (bnc#1176990).\n- CVE-2020-14390: When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1176235 bnc#1176278).\n- CVE-2020-0432: In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176721).\n- CVE-2020-0427: In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176725).\n- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176722).\n- CVE-2020-0404: In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176423).\n- CVE-2020-25284: The rbd block device driver in drivers/block/rbd.c used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe (bnc#1176482).\n- CVE-2020-14386: Memory corruption in af_apcket can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bnc#1176069).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- Add de2b41be8fcc x86, vmlinux.lds: Page-align end of ..page_aligned sections\n- Add f29dfa53cc8a x86/bugs/multihit: Fix mitigation reporting when VMX is not in use\n- airo: Add missing CAP_NET_ADMIN check in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE (git-fixes).\n- airo: Fix read overflows sending packets (git-fixes).\n- ALSA: asihpi: fix iounmap in error handler (git-fixes).\n- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).\n- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).\n- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).\n- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).\n- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).\n- altera-stapl: altera_get_note: prevent write beyond end of \u0027key\u0027 (git-fixes).\n- amd-xgbe: Add a check for an skb in the timestamp path (git-fixes).\n- amd-xgbe: Add additional dynamic debug messages (git-fixes).\n- amd-xgbe: Add additional ethtool statistics (git-fixes).\n- amd-xgbe: Add ethtool show/set channels support (git-fixes).\n- amd-xgbe: Add ethtool show/set ring parameter support (git-fixes).\n- amd-xgbe: Add ethtool support to retrieve SFP module info (git-fixes).\n- amd-xgbe: Add hardware features debug output (git-fixes).\n- amd-xgbe: Add NUMA affinity support for IRQ hints (git-fixes).\n- amd-xgbe: Add NUMA affinity support for memory allocations (git-fixes).\n- amd-xgbe: Add per queue Tx and Rx statistics (git-fixes).\n- amd-xgbe: Advertise FEC support with the KR re-driver (git-fixes).\n- amd-xgbe: Always attempt link training in KR mode (git-fixes).\n- amd-xgbe: Be sure driver shuts down cleanly on module removal (git-fixes).\n- amd-xgbe: Convert to generic power management (git-fixes).\n- amd-xgbe: Fix debug output of max channel counts (git-fixes).\n- amd-xgbe: Fix error path in xgbe_mod_init() (git-fixes).\n- amd-xgbe: Fixes for working with PHYs that support 2.5GbE (git-fixes).\n- amd-xgbe: Fix SFP PHY supported/advertised settings (git-fixes).\n- amd-xgbe: fix spelling mistake: \u0027avialable\u0027 -\u003e \u0027available\u0027 (git-fixes).\n- amd-xgbe: Handle return code from software reset function (git-fixes).\n- amd-xgbe: Improve SFP 100Mbps auto-negotiation (git-fixes).\n- amd-xgbe: Interrupt summary bits are h/w version dependent (git-fixes).\n- amd-xgbe: Limit the I2C error messages that are output (git-fixes).\n- amd-xgbe: Mark expected switch fall-throughs (git-fixes).\n- amd-xgbe: Optimize DMA channel interrupt enablement (git-fixes).\n- amd-xgbe: Prepare for ethtool set-channel support (git-fixes).\n- amd-xgbe: Prevent looping forever if timestamp update fails (git-fixes).\n- amd-xgbe: Read and save the port property registers during probe (git-fixes).\n- amd-xgbe: Remove field that indicates SFP diagnostic support (git-fixes).\n- amd-xgbe: remove unnecessary conversion to bool (git-fixes).\n- amd-xgbe: Remove use of comm_owned field (git-fixes).\n- amd-xgbe: Set the MDIO mode for 10000Base-T configuration (git-fixes).\n- amd-xgbe: Simplify the burst length settings (git-fixes).\n- amd-xgbe: Update the BelFuse quirk to support SGMII (git-fixes).\n- amd-xgbe: Update TSO packet statistics accuracy (git-fixes).\n- amd-xgbe: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- amd-xgbe: use dma_mapping_error to check map errors (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (git-fixes).\n- amd-xgbe: Use the proper register during PTP initialization (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: KVM: Do not generate UNDEF when LORegion feature is present (jsc#SLE-4084).\n- arm64: KVM: regmap: Fix unexpected switch fall-through (jsc#SLE-4084).\n- asm-generic: fix -Wtype-limits compiler warnings (bsc#1112178).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: tegra: Fix reference count leaks (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- batman-adv: Add missing include for in_interrupt() (git-fixes).\n- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).\n- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).\n- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).\n- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).\n- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).\n- bcache: Convert pr_\u0026lt;level\u003e uses to a more typical style (git fixes (block drivers)).\n- bcache: fix overflow in offset_to_stripe() (git fixes (block drivers)).\n- bcm63xx_enet: correct clock usage (git-fixes).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (git-fixes).\n- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).\n- blktrace: fix debugfs use after free (git fixes (block drivers)).\n- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).\n- block: revert back to synchronous request_queue removal (git fixes (block drivers)).\n- block: Use non _rcu version of list functions for tag_set_list (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).\n- bonding: use nla_get_u64 to extract the value for IFLA_BOND_AD_ACTOR_SYSTEM (git-fixes).\n- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).\n- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).\n- ceph: do not allow setlease on cephfs (bsc#1177041).\n- ceph: fix potential mdsc use-after-free crash (bsc#1177042).\n- ceph: fix use-after-free for fsc-\u003emdsc (bsc#1177043).\n- ceph: handle zero-length feature mask in session messages (bsc#1177044).\n- cfg80211: regulatory: reject invalid hints (bsc#1176699).\n- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).\n- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).\n- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).\n- clk: Add (devm_)clk_get_optional() functions (git-fixes).\n- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- cpufreq: intel_pstate: Fix EPP setting via sysfs in active mode (bsc#1176966).\n- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).\n- dmaengine: of-dma: Fix of_dma_router_xlate\u0027s of_dma_xlate handling (git-fixes).\n- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- dm crypt: avoid truncating the logical block size (git fixes (block drivers)).\n- dm: fix redundant IO accounting for bios that need splitting (git fixes (block drivers)).\n- dm integrity: fix a deadlock due to offloading to an incorrect workqueue (git fixes (block drivers)).\n- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).\n- dm: report suspended device during destroy (git fixes (block drivers)).\n- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).\n- dm: use noio when sending kobject event (git fixes (block drivers)).\n- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).\n- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).\n- dm zoned: assign max_io_len correctly (git fixes (block drivers)).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).\n- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).\n- drivers: net: add missing interrupt.h include (git-fixes).\n- drivers/net/ethernet/marvell/mvmdio.c: Fix non OF case (git-fixes).\n- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).\n- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).\n- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix reference count leaks (git-fixes).\n- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).\n- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).\n- drm/ast: Initialize DRAM type before posting GPU (bsc#1113956) \t* context changes\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component init fail (git-fixes).\n- drm/mediatek: Add missing put_device() call in mtk_hdmi_dt_parse_pdata() (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/msm/gpu: make ringbuffer readonly (bsc#1112178) \t* context changes\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).\n- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).\n- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/radeon: fix multiple reference count leak (git-fixes).\n- drm/radeon: Prefer lower feedback dividers (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (git-fixes).\n- drm/sun4i: Fix dsi dcs long write function (git-fixes).\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4/vc4_hdmi: fill ASoC card owner (git-fixes).\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- EDAC: Fix reference count leaks (bsc#1112178).\n- fbcon: prevent user font height or width change from causing (bsc#1112178)\n- Fix error in kabi fix for: NFSv4: Fix OPEN / CLOSE race (bsc#1176950).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).\n- gma/gma500: fix a memory disclosure bug due to uninitialized bytes (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- gtp: add missing gtp_encap_disable_sock() in gtp_encap_enable() (git-fixes).\n- gtp: fix Illegal context switch in RCU read-side critical section (git-fixes).\n- gtp: fix use-after-free in gtp_newlink() (git-fixes).\n- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).\n- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).\n- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).\n- hv_utils: return error if host timesysnc update is stale (bsc#1176877).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).\n- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).\n- iio: adc: mcp3422: fix locking on error path (git-fixes).\n- iio: adc: mcp3422: fix locking scope (git-fixes).\n- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).\n- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).\n- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).\n- include: add additional sizes (bsc#1094244 ltc#168122).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177293).\n- iommu/amd: Fix potential @entry null deref (bsc#1177294).\n- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176316).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177291).\n- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176317).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177295).\n- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176318).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177296).\n- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176319).\n- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176320).\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- kernel-syms.spec.in: Also use bz compression (boo#1175882).\n- KVM: arm64: Change 32-bit handling of VM system registers (jsc#SLE-4084).\n- KVM: arm64: Cleanup __activate_traps and __deactive_traps for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Configure c15, PMU, and debug register traps on cpu load/put for VHE (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put (jsc#SLE-4084).\n- KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on VHE (jsc#SLE-4084).\n- KVM: arm64: Directly call VHE and non-VHE FPSIMD enabled functions (jsc#SLE-4084).\n- KVM: arm64: Do not deactivate VM on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Do not save the host ELR_EL2 and SPSR_EL2 on VHE systems (jsc#SLE-4084).\n- KVM: arm64: Factor out fault info population and gic workarounds (jsc#SLE-4084).\n- KVM: arm64: Fix order of vcpu_write_sys_reg() arguments (jsc#SLE-4084).\n- KVM: arm64: Forbid kprobing of the VHE world-switch code (jsc#SLE-4084).\n- KVM: arm64: Improve debug register save/restore flow (jsc#SLE-4084).\n- KVM: arm64: Introduce framework for accessing deferred sysregs (jsc#SLE-4084).\n- KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Introduce VHE-specific kvm_vcpu_run (jsc#SLE-4084).\n- KVM: arm64: Move common VHE/non-VHE trap config in separate functions (jsc#SLE-4084).\n- KVM: arm64: Move debug dirty flag calculation out of world switch (jsc#SLE-4084).\n- KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag (jsc#SLE-4084).\n- KVM: arm64: Move userspace system registers into separate function (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of 32-bit registers (jsc#SLE-4084).\n- KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1 (jsc#SLE-4084).\n- KVM: arm64: Remove kern_hyp_va() use in VHE switch function (jsc#SLE-4084).\n- KVM: arm64: Remove noop calls to timer save/restore from VHE switch (jsc#SLE-4084).\n- KVM: arm64: Rework hyp_panic for VHE and non-VHE (jsc#SLE-4084).\n- KVM: arm64: Rewrite sysreg alternatives to static keys (jsc#SLE-4084).\n- KVM: arm64: Rewrite system register accessors to read/write functions (jsc#SLE-4084).\n- KVM: arm64: Slightly improve debug save/restore functions (jsc#SLE-4084).\n- KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions (jsc#SLE-4084).\n- KVM: arm64: Write arch.mdcr_el2 changes since last vcpu_load on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN (jsc#SLE-4084).\n- KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs (jsc#SLE-4084).\n- KVM: arm/arm64: Get rid of vcpu-\u003earch.irq_lines (jsc#SLE-4084).\n- KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on VHE (jsc#SLE-4084).\n- KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init (jsc#SLE-4084).\n- KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load (jsc#SLE-4084).\n- KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1 (jsc#SLE-4084).\n- KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe (jsc#SLE-4084).\n- KVM: introduce kvm_arch_vcpu_async_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs (jsc#SLE-4084).\n- KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate (jsc#SLE-4084).\n- KVM: PPC: Fix compile error that occurs when CONFIG_ALTIVEC=n (jsc#SLE-4084).\n- KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code (jsc#SLE-4084).\n- KVM: SVM: Add a dedicated INVD intercept routine (bsc#1112178).\n- KVM: SVM: Fix disable pause loop exit/pause filtering capability on SVM (bsc#1176321).\n- KVM: SVM: fix svn_pin_memory()\u0027s use of get_user_pages_fast() (bsc#1112178).\n- KVM: Take vcpu-\u003emutex outside vcpu_load (jsc#SLE-4084).\n- libceph: allow setting abort_on_full for rbd (bsc#1169972).\n- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).\n- libnvdimm: cover up struct nvdimm changes (bsc#1171742).\n- libnvdimm/security, acpi/nfit: unify zero-key for all security commands (bsc#1171742).\n- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).\n- libnvdimm/security: Introduce a \u0027frozen\u0027 attribute (bsc#1171742).\n- lib/raid6: use vdupq_n_u8 to avoid endianness warnings (git fixes (block drivers)).\n- livepatch: Add -fdump-ipa-clones to build (). Add support for -fdump-ipa-clones GCC option. Update config files accordingly.\n- mac802154: tx: fix use-after-free (git-fixes).\n- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).\n- media: davinci: vpif_capture: fix potential double free (git-fixes).\n- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mm/page_alloc.c: fix a crash in free_pages_prepare() (git fixes (mm/pgalloc)).\n- mm/vmalloc.c: move \u0027area-\u003epages\u0027 after if statement (git fixes (mm/vmalloc)).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: lpddr: Fix a double free in probe() (git-fixes).\n- mtd: phram: fix a double free issue in error path (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- net: 8390: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: amd: fix return type of ndo_start_xmit function (git-fixes).\n- net/amd: Remove useless driver version (git-fixes).\n- net: amd-xgbe: fix comparison to bitshift when dealing with a mask (git-fixes).\n- net: amd-xgbe: Get rid of custom hex_dump_to_buffer() (git-fixes).\n- net: apple: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: broadcom: Fix manufacturer name in Kconfig help text (git-fixes).\n- net: dsa: b53: Fix sparse warnings in b53_mmap.c (git-fixes).\n- net: dsa: b53: Use strlcpy() for ethtool::get_strings (git-fixes).\n- net: dsa: mv88e6xxx: fix 6085 frame mode masking (git-fixes).\n- net: dsa: mv88e6xxx: Fix interrupt masking on removal (git-fixes).\n- net: dsa: mv88e6xxx: Fix name of switch 88E6141 (git-fixes).\n- net: dsa: mv88e6xxx: fix shift of FID bits in mv88e6185_g1_vtu_loadpurge() (git-fixes).\n- net: dsa: mv88e6xxx: Unregister MDIO bus on error path (git-fixes).\n- net: dsa: qca8k: Allow overwriting CPU port setting (git-fixes).\n- net: dsa: qca8k: Enable RXMAC when bringing up a port (git-fixes).\n- net: dsa: qca8k: Force CPU port to its highest bandwidth (git-fixes).\n- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).\n- net: fs_enet: do not call phy_stop() in interrupts (git-fixes).\n- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).\n- net: lan78xx: Bail out if lan78xx_get_endpoints fails (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (networking-stable-20_08_08).\n- net: lio_core: fix potential sign-extension overflow on large shift (git-fixes).\n- net/mlx5: Add meaningful return codes to status_to_err function (git-fixes).\n- net/mlx5: E-Switch, Use correct flags when configuring vlan (git-fixes).\n- net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded (git-fixes).\n- net: mvmdio: defer probe of orion-mdio if a clock is not ready (git-fixes).\n- net: mvneta: fix mtu change on port without link (git-fixes).\n- net-next: ax88796: Do not free IRQ in ax_remove() (already freed in ax_close()) (git-fixes).\n- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).\n- net: qca_spi: Avoid packet drop during initial sync (git-fixes).\n- net: qca_spi: Make sure the QCA7000 reset is triggered (git-fixes).\n- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: improve close of terminated socket (git-fixes).\n- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: tolerate future SMCD versions (git-fixes).\n- net: stmmac: call correct function in stmmac_mac_config_rx_queues_routing() (git-fixes).\n- net: stmmac: Disable ACS Feature for GMAC \u003e= 4 (git-fixes).\n- net: stmmac: do not stop NAPI processing when dropping a packet (git-fixes).\n- net: stmmac: dwmac4: fix flow control issue (git-fixes).\n- net: stmmac: dwmac_lib: fix interchanged sleep/timeout values in DMA reset function (git-fixes).\n- net: stmmac: dwmac-meson8b: Add missing boundary to RGMII TX clock array (git-fixes).\n- net: stmmac: dwmac-meson8b: fix internal RGMII clock configuration (git-fixes).\n- net: stmmac: dwmac-meson8b: fix setting the RGMII TX clock on Meson8b (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix the RGMII TX delay on Meson8b/8m2 SoCs (git-fixes).\n- net: stmmac: dwmac-meson8b: only configure the clocks in RGMII mode (git-fixes).\n- net: stmmac: dwmac-meson8b: propagate rate changes to the parent clock (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_rx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: Fix error handling path in \u0027alloc_dma_tx_desc_resources()\u0027 (git-fixes).\n- net: stmmac: rename dwmac4_tx_queue_routing() to match reality (git-fixes).\n- net: stmmac: set MSS for each tx DMA channel (git-fixes).\n- net: stmmac: Use correct values in TQS/RQS fields (git-fixes).\n- net-sysfs: add a newline when printing \u0027tx_timeout\u0027 by sysfs (networking-stable-20_07_29).\n- net: systemport: Fix software statistics for SYSTEMPORT Lite (git-fixes).\n- net: systemport: Fix sparse warnings in bcm_sysport_insert_tsb() (git-fixes).\n- net: tc35815: Explicitly check NET_IP_ALIGN is not zero in tc35815_rx (git-fixes).\n- net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE() (git-fixes).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (git-fixes).\n- NFSv4: do not mark all open state for recovery when handling recallable state revoked flag (bsc#1176935).\n- nvme-fc: set max_segments to lldd max value (bsc#1176038).\n- nvme-pci: override the value of the controller\u0027s numa node (bsc#1176507).\n- ocfs2: give applications more IO opportunities during fstrim (bsc#1175228).\n- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).\n- PCI/ASPM: Allow re-enabling Clock PM (git-fixes).\n- PCI: Fix pci_create_slot() reference count leak (git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- phy: samsung: s5pv210-usb2: Add delay after reset (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- powerpc/64s: Blacklist functions invoked on a trap (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix HV NMI vs HV interrupt recoverability test (bsc#1094244 ltc#168122).\n- powerpc/64s: Fix unrelocated interrupt trampoline address test (bsc#1094244 ltc#168122).\n- powerpc/64s: Include \u0026lt;asm/nmi.h\u003e header file to fix a warning (bsc#1094244 ltc#168122).\n- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).\n- powerpc/64s: sreset panic if there is no debugger or crash dump handlers (bsc#1094244 ltc#168122).\n- powerpc/64s: system reset interrupt preserve HSRRs (bsc#1094244 ltc#168122).\n- powerpc: Add cputime_to_nsecs() (bsc#1065729).\n- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436).\n- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).\n- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).\n- powerpc/init: Do not advertise radix during client-architecture-support (bsc#1055186 ltc#153436 ).\n- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).\n- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).\n- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436).\n- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).\n- powerpc/mm: Move book3s64 specifics in subdirectory mm/book3s64 (bsc#1176022 ltc#187208).\n- powerpc/powernv: Remove real mode access limit for early allocations (bsc#1176022 ltc#187208).\n- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436).\n- powerpc/pseries/le: Work around a firmware quirk (bsc#1094244 ltc#168122).\n- powerpc/pseries: lift RTAS limit for radix (bsc#1176022 ltc#187208).\n- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).\n- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).\n- powerpc/pseries: radix is not subject to RMA limit, remove it (bsc#1176022 ltc#187208).\n- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).\n- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).\n- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).\n- powerpc/traps: fix recoverability of machine check handling on book3s/32 (bsc#1094244 ltc#168122).\n- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).\n- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- rcu: Do RCU GP kthread self-wakeup from softirq and interrupt (git fixes (rcu)).\n- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).\n- Revert \u0027ALSA: hda: Add support for Loongson 7A1000 controller\u0027 (git-fixes).\n- Revert \u0027ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control\u0027 (git-fixes).\n- Revert \u0027i2c: cadence: Fix the hold bit setting\u0027 (git-fixes).\n- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).\n- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)\n- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).\n- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, \u0027--ca-check\u0027 is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it\u0027s used to determine whether the %post script is running in a kernel package, or a kernel module package.\n- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).\n- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The \u0027-c\u0027 option wasn\u0027t passed down to %_kernel_module_package so the ueficert subpackage wasn\u0027t generated even if the certificate is specified in the spec file.\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).\n- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).\n- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).\n- s390/mm: fix huge pte soft dirty copying (git-fixes).\n- s390/qeth: do not process empty bridge port events (git-fixes).\n- s390/qeth: integrate RX refill worker with NAPI (git-fixes).\n- s390/qeth: tolerate pre-filled RX buffer (git-fixes).\n- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).\n- scsi: fnic: Do not call \u0027scsi_done()\u0027 for unhandled commands (bsc#1168468, bsc#1171675).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: libfc: Fix for double free() (bsc#1174899).\n- scsi: libfc: free response frame from GPN_ID (bsc#1174899).\n- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).\n- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).\n- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).\n- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).\n- scsi: qla2xxx: Fix the return value (bsc#1171688).\n- scsi: qla2xxx: Fix the size used in a \u0027dma_free_coherent()\u0027 call (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).\n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).\n- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).\n- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- Set CONFIG_HAVE_KVM_VCPU_ASYNC_IOCTL=y (jsc#SLE-4084).\n- smb3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).\n- smb3: Honor \u0027seal\u0027 flag for multiuser mounts (bsc#1176545).\n- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- stmmac: Do not access tx_q-\u003edirty_tx before netif_tx_lock (git-fixes).\n- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).\n- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).\n- tools/power/cpupower: Fix initializer override in hsw_ext_cstates (bsc#1112178).\n- usb: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- usb: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- usb: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- usb: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).\n- usb: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).\n- usb: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- usb: gadget: u_f: add overflow checks to VLA macros (git-fixes).\n- usb: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).\n- usb: hso: check for return value in hso_serial_common_create() (networking-stable-20_08_08).\n- usblp: fix race between disconnect() and read() (git-fixes).\n- usb: lvtest: return proper error code in probe (git-fixes).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (git-fixes).\n- usb: qmi_wwan: add D-Link DWM-222 A2 device ID (git-fixes).\n- usb: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).\n- usb: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).\n- usb: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).\n- usb: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).\n- usb: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).\n- usb: serial: option: support dynamic Quectel USB compositions (git-fixes).\n- usb: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).\n- usb: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).\n- usb: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).\n- usb: uas: Add quirk for PNY Pro Elite (git-fixes).\n- usb: UAS: fix disconnect by unplugging a hub (git-fixes).\n- usb: yurex: Fix bad gfp argument (git-fixes).\n- vgacon: remove software scrollback support (bsc#1176278).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- vrf: prevent adding upper devices (git-fixes).\n- vxge: fix return of a free\u0027d memblock on a failed dma mapping (git-fixes).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).\n- xgbe: no need to check return value of debugfs_create functions (git-fixes).\n- xgbe: switch to more generic VxLAN detection (git-fixes).\n- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1655", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1655-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1655-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1655-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1169972", "url": "https://bugzilla.suse.com/1169972" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176316", "url": "https://bugzilla.suse.com/1176316" }, { "category": "self", "summary": "SUSE Bug 1176317", "url": "https://bugzilla.suse.com/1176317" }, { "category": "self", "summary": "SUSE Bug 1176318", "url": "https://bugzilla.suse.com/1176318" }, { "category": "self", "summary": "SUSE Bug 1176319", "url": "https://bugzilla.suse.com/1176319" }, { "category": "self", "summary": "SUSE Bug 1176320", "url": "https://bugzilla.suse.com/1176320" }, { "category": "self", "summary": "SUSE Bug 1176321", "url": "https://bugzilla.suse.com/1176321" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176935", "url": "https://bugzilla.suse.com/1176935" }, { "category": "self", "summary": "SUSE Bug 1176950", "url": "https://bugzilla.suse.com/1176950" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176966", "url": "https://bugzilla.suse.com/1176966" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177041", "url": "https://bugzilla.suse.com/1177041" }, { "category": "self", "summary": "SUSE Bug 1177042", "url": "https://bugzilla.suse.com/1177042" }, { "category": "self", "summary": "SUSE Bug 1177043", "url": "https://bugzilla.suse.com/1177043" }, { "category": "self", "summary": "SUSE Bug 1177044", "url": "https://bugzilla.suse.com/1177044" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177291", "url": "https://bugzilla.suse.com/1177291" }, { "category": "self", "summary": "SUSE Bug 1177293", "url": "https://bugzilla.suse.com/1177293" }, { "category": "self", "summary": "SUSE Bug 1177294", "url": "https://bugzilla.suse.com/1177294" }, { "category": "self", "summary": "SUSE Bug 1177295", "url": "https://bugzilla.suse.com/1177295" }, { "category": "self", "summary": "SUSE Bug 1177296", "url": "https://bugzilla.suse.com/1177296" }, { "category": "self", "summary": "SUSE Bug 962356", "url": "https://bugzilla.suse.com/962356" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-11T13:53:22Z", "generator": { "date": "2020-10-11T13:53:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1655-1", "initial_release_date": "2020-10-11T13:53:22Z", "revision_history": [ { "date": "2020-10-11T13:53:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.71.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.71.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.71.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.71.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.71.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.71.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.71.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.71.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.71.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.71.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.71.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.71.2.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.71.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-11T13:53:22Z", "details": "moderate" } ], "title": "CVE-2020-26088" } ] }
opensuse-su-2020:1698-1
Vulnerability from csaf_opensuse
Published
2020-10-19 16:23
Modified
2020-10-19 16:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).
- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).
- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).
- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).
The following non-security bugs were fixed:
- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Move upstreamed intel-vbtn patch into sorted section
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc->setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
Patchnames
openSUSE-2020-1698
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadKarma\u0027 (bsc#1177724).\n- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka \u0027BleedingTooth\u0027 aka \u0027BadVibes\u0027 (bsc#1177726).\n- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka \u0027BleedingTooth\u0027 aka \u0027BadChoice\u0027 (bsc#1177725).\n- CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452 (bnc#1176381).\n- CVE-2020-25645: Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1177511).\n- CVE-2020-25643: Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (bnc#1177206).\n- CVE-2020-25641: A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allowed a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bnc#1177121).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix memory leak in v9fs_mount (git-fixes).\n- ACPI: EC: Reference count query handlers under lock (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).\n- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).\n- ASoC: kirkwood: fix IRQ error handling (git-fixes).\n- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).\n- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).\n- Bluetooth: Fix refcount use-after-free issue (git-fixes).\n- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).\n- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).\n- Bluetooth: guard against controllers sending zero\u0027d events (git-fixes).\n- Bluetooth: prefetch channel before killing sock (git-fixes).\n- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).\n- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Move upstreamed intel-vbtn patch into sorted section\n- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).\n- NFS: Do not return layout segments that are in use (git-fixes).\n- NFS: Fix flexfiles read failover (git-fixes).\n- NFSv4.2: fix client\u0027s attribute cache management for copy_file_range (git-fixes).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).\n- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).\n- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).\n- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).\n- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).\n- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).\n- SUNRPC: Revert 241b1f419f0e (\u0027SUNRPC: Remove xdr_buf_trim()\u0027) (git-fixes).\n- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).\n- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).\n- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).\n- Update patches.suse/target-add-rbd-backend.patch: (). (simplify block to byte calculations and use consistent error paths)\n- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).\n- airo: Fix read overflows sending packets (git-fixes).\n- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).\n- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).\n- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).\n- ath10k: fix array out-of-bounds access (git-fixes).\n- ath10k: fix memory leak for tpc_stats_final (git-fixes).\n- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).\n- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).\n- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).\n- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).\n- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).\n- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).\n- btrfs: block-group: refactor how we read one block group item (bsc#1176019).\n- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).\n- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).\n- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).\n- btrfs: do not take an extra root ref at allocation time (bsc#1176019).\n- btrfs: drop logs when we\u0027ve aborted a transaction (bsc#1176019).\n- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).\n- btrfs: fix race between page release and a fast fsync (bsc#1177687).\n- btrfs: free block groups after free\u0027ing fs trees (bsc#1176019).\n- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).\n- btrfs: kill the subvol_srcu (bsc#1176019).\n- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).\n- btrfs: make inodes hold a ref on their roots (bsc#1176019).\n- btrfs: make the extent buffer leak check per fs info (bsc#1176019).\n- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).\n- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).\n- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).\n- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).\n- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).\n- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).\n- btrfs: release old extent maps during page release (bsc#1177687).\n- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).\n- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).\n- btrfs: rename member \u0027trimming\u0027 of block group to a more generic name (bsc#1176019).\n- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).\n- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).\n- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).\n- clk/ti/adpll: allocate room for terminating null (git-fixes).\n- clk: samsung: exynos4: mark \u0027chipid\u0027 clock as CLK_IGNORE_UNUSED (git-fixes).\n- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).\n- clk: tegra: Always program PLL_E when enabled (git-fixes).\n- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).\n- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).\n- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).\n- create Storage / NVMe subsection\n- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).\n- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).\n- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).\n- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: dh - check validity of Z before export (bsc#1175718).\n- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).\n- crypto: ecdh - check validity of Z before export (bsc#1175718).\n- crypto: ixp4xx - Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).\n- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).\n- crypto: picoxcell - Fix potential race condition bug (git-fixes).\n- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).\n- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).\n- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).\n- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).\n- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).\n- dmaengine: tegra-apb: Prevent race conditions on channel\u0027s freeing (git-fixes).\n- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).\n- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).\n- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).\n- drm/radeon: revert \u0027Prefer lower feedback dividers\u0027 (bsc#1177384).\n- drop Storage / bsc#1171688 subsection No effect on expanded tree.\n- e1000: Do not perform reset in reset_task if we are already down (git-fixes).\n- ftrace: Move RCU is watching check after recursion check (git-fixes).\n- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).\n- gpio: mockup: fix resource leak in error path (git-fixes).\n- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).\n- gpio: siox: explicitly support only threaded irqs (git-fixes).\n- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).\n- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).\n- hwmon: (applesmc) check status earlier (git-fixes).\n- hwmon: (mlxreg-fan) Fix double \u0027Mellanox\u0027 (git-fixes).\n- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).\n- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).\n- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).\n- i2c: cpm: Fix i2c_ram structure (git-fixes).\n- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).\n- i2c: meson: fix clock setting overwrite (git-fixes).\n- i2c: meson: fixup rate calculation with filter delay (git-fixes).\n- i2c: owl: Clear NACK and BUS error bits (git-fixes).\n- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).\n- i2c: tegra: Restore pinmux on system resume (git-fixes).\n- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).\n- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).\n- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).\n- ima: extend boot_aggregate with kernel measurements (bsc#1177617).\n- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).\n- iommu/amd: Fix potential @entry null deref (bsc#1177283).\n- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).\n- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).\n- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).\n- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- kabi fix for NFS: Fix flexfiles read failover (git-fixes).\n- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.\n- kernel-binary.spec.in: Exclude .config.old from kernel-devel - use tar excludes for .kernel-binary.spec.buildenv\n- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\n- leds: mlxreg: Fix possible buffer overflow (git-fixes).\n- lib/mpi: Add mpi_sub_ui() (bsc#1175718).\n- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).\n- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).\n- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).\n- mac80211: skip mpath lookup also for control port tx (git-fixes).\n- mac802154: tx: fix use-after-free (git-fixes).\n- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).\n- media: Revert \u0027media: exynos4-is: Add missed check for pinctrl_lookup_state()\u0027 (git-fixes).\n- media: camss: Fix a reference count leak (git-fixes).\n- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).\n- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).\n- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).\n- media: omap3isp: Fix memleak in isp_probe (git-fixes).\n- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).\n- media: platform: fcp: Fix a reference count leak (git-fixes).\n- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).\n- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).\n- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).\n- media: rcar-vin: Fix a reference count leak (git-fixes).\n- media: rockchip/rga: Fix a reference count leak (git-fixes).\n- media: s5p-mfc: Fix a reference count leak (git-fixes).\n- media: smiapp: Fix error handling at NVM reading (git-fixes).\n- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).\n- media: stm32-dcmi: Fix a reference count leak (git-fixes).\n- media: tc358743: cleanup tc358743_cec_isr (git-fixes).\n- media: tc358743: initialize variable (git-fixes).\n- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).\n- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).\n- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).\n- media: usbtv: Fix refcounting mixup (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Document asd allocation requirements (git-fixes).\n- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).\n- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).\n- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).\n- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).\n- mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692).\n- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).\n- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).\n- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).\n- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).\n- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).\n- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).\n- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).\n- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).\n- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).\n- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).\n- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).\n- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).\n- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).\n- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).\n- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).\n- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).\n- mmc: core: Rework wp-gpio handling (git-fixes).\n- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).\n- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).\n- mt76: add missing locking around ampdu action (git-fixes).\n- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).\n- mt76: do not use devm API for led classdev (git-fixes).\n- mt76: fix LED link time failure (git-fixes).\n- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).\n- mtd: cfi_cmdset_0002: do not free cfi-\u003ecfiq in error path of cfi_amdstd_setup() (git-fixes).\n- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).\n- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).\n- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).\n- nfs: Fix security label length not being reset (bsc#1176381).\n- nfs: ensure correct writeback errors are returned on close() (git-fixes).\n- nfs: nfs_file_write() should check for writeback errors (git-fixes).\n- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).\n- nvme-multipath: retry commands for dying queues (bsc#1171688).\n- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).\n- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).\n- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).\n- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).\n- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).\n- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).\n- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).\n- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).\n- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).\n- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).\n- power: supply: max17040: Correct voltage reading (git-fixes).\n- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).\n- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).\n- r8169: fix data corruption issue on RTL8402 (bsc#1174098).\n- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).\n- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).\n- regulator: axp20x: fix LDO2/4 description (git-fixes).\n- regulator: resolve supply after creating regulator (git-fixes).\n- rename Other drivers / Intel IOMMU subsection to IOMMU\n- rtc: ds1374: fix possible race condition (git-fixes).\n- rtc: sa1100: fix possible race condition (git-fixes).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).\n- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).\n- sched/numa: Check numa balancing information only when enabled (bnc#1176588).\n- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove unneeded variable \u0027rval\u0027 (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).\n- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).\n- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).\n- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).\n- serial: uartps: Wait for tx_empty in console setup (git-fixes).\n- spi: dw-pci: free previously allocated IRQs if desc-\u003esetup() fails (git-fixes).\n- spi: fsl-espi: Only process interrupts for expected events (git-fixes).\n- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).\n- spi: sprd: Release DMA channel also on probe deferral (git-fixes).\n- spi: stm32: Rate-limit the \u0027Communication suspended\u0027 message (git-fixes).\n- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).\n- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).\n- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).\n- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).\n- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).\n- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).\n- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).\n- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).\n- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).\n- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).\n- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).\n- virtio-net: do not disable guest csum when disable LRO (git-fixes).\n- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).\n- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).\n- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).\n- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).\n- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n- yam: fix possible memory leak in yam_init_driver (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1698", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1698-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1698-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1698-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-10-19T16:23:34Z", "generator": { "date": "2020-10-19T16:23:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1698-1", "initial_release_date": "2020-10-19T16:23:34Z", "revision_history": [ { "date": "2020-10-19T16:23:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-devel-5.3.18-lp152.47.2.noarch", "product_id": "kernel-devel-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-lp152.47.1.noarch", "product": { "name": "kernel-docs-5.3.18-lp152.47.1.noarch", "product_id": "kernel-docs-5.3.18-lp152.47.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "product_id": "kernel-docs-html-5.3.18-lp152.47.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-macros-5.3.18-lp152.47.2.noarch", "product_id": "kernel-macros-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-source-5.3.18-lp152.47.2.noarch", "product_id": "kernel-source-5.3.18-lp152.47.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-debug-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-debug-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-default-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-default-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-default-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-obs-build-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-preempt-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-lp152.47.1.x86_64", "product": { "name": "kernel-syms-5.3.18-lp152.47.1.x86_64", "product_id": "kernel-syms-5.3.18-lp152.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-debug-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-default-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-devel-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-lp152.47.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch" }, "product_reference": "kernel-docs-5.3.18-lp152.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-lp152.47.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-lp152.47.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-macros-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-source-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-lp152.47.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-lp152.47.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.47.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.47.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.47.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.47.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-19T16:23:34Z", "details": "important" } ], "title": "CVE-2020-25645" } ] }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for RT kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-242", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1139944", "url": "https://bugzilla.suse.com/1139944" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156315", "url": "https://bugzilla.suse.com/1156315" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1159886", "url": "https://bugzilla.suse.com/1159886" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161099", "url": "https://bugzilla.suse.com/1161099" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162209", "url": "https://bugzilla.suse.com/1162209" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165455", "url": "https://bugzilla.suse.com/1165455" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1166340", "url": "https://bugzilla.suse.com/1166340" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167657", "url": "https://bugzilla.suse.com/1167657" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168461", "url": "https://bugzilla.suse.com/1168461" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169263", "url": "https://bugzilla.suse.com/1169263" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169763", "url": "https://bugzilla.suse.com/1169763" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171000", "url": "https://bugzilla.suse.com/1171000" }, { "category": "self", "summary": "SUSE Bug 1171068", "url": "https://bugzilla.suse.com/1171068" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171117", "url": "https://bugzilla.suse.com/1171117" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171156", "url": "https://bugzilla.suse.com/1171156" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171236", "url": "https://bugzilla.suse.com/1171236" }, { "category": "self", "summary": "SUSE Bug 1171242", "url": "https://bugzilla.suse.com/1171242" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171285", "url": "https://bugzilla.suse.com/1171285" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171374", "url": "https://bugzilla.suse.com/1171374" }, { "category": "self", "summary": "SUSE Bug 1171390", "url": "https://bugzilla.suse.com/1171390" }, { "category": "self", "summary": "SUSE Bug 1171391", "url": "https://bugzilla.suse.com/1171391" }, { "category": "self", "summary": "SUSE Bug 1171392", "url": "https://bugzilla.suse.com/1171392" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171426", "url": "https://bugzilla.suse.com/1171426" }, { "category": "self", "summary": "SUSE Bug 1171507", "url": "https://bugzilla.suse.com/1171507" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171514", "url": "https://bugzilla.suse.com/1171514" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171644", "url": "https://bugzilla.suse.com/1171644" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171709", "url": "https://bugzilla.suse.com/1171709" }, { "category": "self", "summary": "SUSE Bug 1171730", "url": "https://bugzilla.suse.com/1171730" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171773", "url": "https://bugzilla.suse.com/1171773" }, { "category": "self", "summary": "SUSE Bug 1171774", "url": "https://bugzilla.suse.com/1171774" }, { "category": "self", "summary": "SUSE Bug 1171775", "url": "https://bugzilla.suse.com/1171775" }, { "category": "self", "summary": "SUSE Bug 1171776", "url": "https://bugzilla.suse.com/1171776" }, { "category": "self", "summary": "SUSE Bug 1171777", "url": "https://bugzilla.suse.com/1171777" }, { "category": "self", "summary": "SUSE Bug 1171778", "url": "https://bugzilla.suse.com/1171778" }, { "category": "self", "summary": "SUSE Bug 1171779", "url": "https://bugzilla.suse.com/1171779" }, { "category": "self", "summary": "SUSE Bug 1171780", "url": "https://bugzilla.suse.com/1171780" }, { "category": "self", "summary": "SUSE Bug 1171781", "url": "https://bugzilla.suse.com/1171781" }, { "category": "self", "summary": "SUSE Bug 1171782", "url": "https://bugzilla.suse.com/1171782" }, { "category": "self", "summary": "SUSE Bug 1171783", "url": "https://bugzilla.suse.com/1171783" }, { "category": "self", "summary": "SUSE Bug 1171784", "url": "https://bugzilla.suse.com/1171784" }, { "category": "self", "summary": "SUSE Bug 1171785", "url": "https://bugzilla.suse.com/1171785" }, { "category": "self", "summary": "SUSE Bug 1171786", "url": "https://bugzilla.suse.com/1171786" }, { "category": "self", "summary": "SUSE Bug 1171787", "url": "https://bugzilla.suse.com/1171787" }, { "category": "self", "summary": "SUSE Bug 1171788", "url": "https://bugzilla.suse.com/1171788" }, { "category": "self", "summary": "SUSE Bug 1171789", "url": "https://bugzilla.suse.com/1171789" }, { "category": "self", "summary": "SUSE Bug 1171790", "url": "https://bugzilla.suse.com/1171790" }, { "category": "self", "summary": "SUSE Bug 1171791", "url": "https://bugzilla.suse.com/1171791" }, { "category": "self", "summary": "SUSE Bug 1171792", "url": "https://bugzilla.suse.com/1171792" }, { "category": "self", "summary": "SUSE Bug 1171793", "url": "https://bugzilla.suse.com/1171793" }, { "category": "self", "summary": "SUSE Bug 1171794", "url": "https://bugzilla.suse.com/1171794" }, { "category": "self", "summary": "SUSE Bug 1171795", "url": "https://bugzilla.suse.com/1171795" }, { "category": "self", "summary": "SUSE Bug 1171796", "url": "https://bugzilla.suse.com/1171796" }, { "category": "self", "summary": "SUSE Bug 1171797", "url": "https://bugzilla.suse.com/1171797" }, { "category": "self", "summary": "SUSE Bug 1171798", "url": "https://bugzilla.suse.com/1171798" }, { "category": "self", "summary": "SUSE Bug 1171799", "url": "https://bugzilla.suse.com/1171799" }, { "category": "self", "summary": "SUSE Bug 1171810", "url": "https://bugzilla.suse.com/1171810" }, { "category": "self", "summary": "SUSE Bug 1171827", "url": "https://bugzilla.suse.com/1171827" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171832", "url": "https://bugzilla.suse.com/1171832" }, { "category": "self", "summary": "SUSE Bug 1171833", "url": "https://bugzilla.suse.com/1171833" }, { "category": "self", "summary": "SUSE Bug 1171834", "url": "https://bugzilla.suse.com/1171834" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171839", "url": "https://bugzilla.suse.com/1171839" }, { "category": "self", "summary": "SUSE Bug 1171840", "url": "https://bugzilla.suse.com/1171840" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171842", "url": "https://bugzilla.suse.com/1171842" }, { "category": "self", "summary": "SUSE Bug 1171843", "url": "https://bugzilla.suse.com/1171843" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1171849", "url": "https://bugzilla.suse.com/1171849" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172419", "url": "https://bugzilla.suse.com/1172419" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172733", "url": "https://bugzilla.suse.com/1172733" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173017", "url": "https://bugzilla.suse.com/1173017" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173267", "url": "https://bugzilla.suse.com/1173267" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174029", "url": "https://bugzilla.suse.com/1174029" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174110", "url": "https://bugzilla.suse.com/1174110" }, { "category": "self", "summary": "SUSE Bug 1174111", "url": "https://bugzilla.suse.com/1174111" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174146", "url": "https://bugzilla.suse.com/1174146" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174358", "url": "https://bugzilla.suse.com/1174358" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174486", "url": "https://bugzilla.suse.com/1174486" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175079", "url": "https://bugzilla.suse.com/1175079" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175480", "url": "https://bugzilla.suse.com/1175480" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175787", "url": "https://bugzilla.suse.com/1175787" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1175918", "url": "https://bugzilla.suse.com/1175918" }, { "category": "self", "summary": "SUSE Bug 1175952", "url": "https://bugzilla.suse.com/1175952" }, { "category": "self", "summary": "SUSE Bug 1175995", "url": "https://bugzilla.suse.com/1175995" }, { "category": "self", "summary": "SUSE Bug 1175996", "url": "https://bugzilla.suse.com/1175996" }, { "category": "self", "summary": "SUSE Bug 1175997", "url": "https://bugzilla.suse.com/1175997" }, { "category": "self", "summary": "SUSE Bug 1175998", "url": "https://bugzilla.suse.com/1175998" }, { "category": "self", "summary": "SUSE Bug 1175999", "url": "https://bugzilla.suse.com/1175999" }, { "category": "self", "summary": "SUSE Bug 1176000", "url": "https://bugzilla.suse.com/1176000" }, { "category": "self", "summary": "SUSE Bug 1176001", "url": "https://bugzilla.suse.com/1176001" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176063", "url": "https://bugzilla.suse.com/1176063" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176109", "url": "https://bugzilla.suse.com/1176109" }, { "category": "self", "summary": "SUSE Bug 1176137", "url": "https://bugzilla.suse.com/1176137" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176200", "url": "https://bugzilla.suse.com/1176200" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176236", "url": "https://bugzilla.suse.com/1176236" }, { "category": "self", "summary": "SUSE Bug 1176237", "url": "https://bugzilla.suse.com/1176237" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176357", "url": "https://bugzilla.suse.com/1176357" }, { "category": "self", "summary": "SUSE Bug 1176358", "url": "https://bugzilla.suse.com/1176358" }, { "category": "self", "summary": "SUSE Bug 1176359", "url": "https://bugzilla.suse.com/1176359" }, { "category": "self", "summary": "SUSE Bug 1176360", "url": "https://bugzilla.suse.com/1176360" }, { "category": "self", "summary": "SUSE Bug 1176361", "url": "https://bugzilla.suse.com/1176361" }, { "category": "self", "summary": "SUSE Bug 1176362", "url": "https://bugzilla.suse.com/1176362" }, { "category": "self", "summary": "SUSE Bug 1176363", "url": "https://bugzilla.suse.com/1176363" }, { "category": "self", "summary": "SUSE Bug 1176364", "url": "https://bugzilla.suse.com/1176364" }, { "category": "self", "summary": "SUSE Bug 1176365", "url": "https://bugzilla.suse.com/1176365" }, { "category": "self", "summary": "SUSE Bug 1176366", "url": "https://bugzilla.suse.com/1176366" }, { "category": "self", "summary": "SUSE Bug 1176367", "url": "https://bugzilla.suse.com/1176367" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176396", "url": "https://bugzilla.suse.com/1176396" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176449", "url": "https://bugzilla.suse.com/1176449" }, { "category": "self", "summary": "SUSE Bug 1176481", "url": "https://bugzilla.suse.com/1176481" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176486", "url": "https://bugzilla.suse.com/1176486" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176537", "url": "https://bugzilla.suse.com/1176537" }, { "category": "self", "summary": "SUSE Bug 1176538", "url": "https://bugzilla.suse.com/1176538" }, { "category": "self", "summary": "SUSE Bug 1176539", "url": "https://bugzilla.suse.com/1176539" }, { "category": "self", "summary": "SUSE Bug 1176540", "url": "https://bugzilla.suse.com/1176540" }, { "category": "self", "summary": "SUSE Bug 1176541", "url": "https://bugzilla.suse.com/1176541" }, { "category": "self", "summary": "SUSE Bug 1176542", "url": "https://bugzilla.suse.com/1176542" }, { "category": "self", "summary": "SUSE Bug 1176543", "url": "https://bugzilla.suse.com/1176543" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176558", "url": "https://bugzilla.suse.com/1176558" }, { "category": "self", "summary": "SUSE Bug 1176559", "url": "https://bugzilla.suse.com/1176559" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176586", "url": "https://bugzilla.suse.com/1176586" }, { "category": "self", "summary": "SUSE Bug 1176587", "url": "https://bugzilla.suse.com/1176587" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176763", "url": "https://bugzilla.suse.com/1176763" }, { "category": "self", "summary": "SUSE Bug 1176775", "url": "https://bugzilla.suse.com/1176775" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176833", "url": "https://bugzilla.suse.com/1176833" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176925", "url": "https://bugzilla.suse.com/1176925" }, { "category": "self", "summary": "SUSE Bug 1176942", "url": "https://bugzilla.suse.com/1176942" }, { "category": "self", "summary": "SUSE Bug 1176956", "url": "https://bugzilla.suse.com/1176956" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1176980", "url": "https://bugzilla.suse.com/1176980" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177021", "url": "https://bugzilla.suse.com/1177021" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177066", "url": "https://bugzilla.suse.com/1177066" }, { "category": "self", "summary": "SUSE Bug 1177070", "url": "https://bugzilla.suse.com/1177070" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177326", "url": "https://bugzilla.suse.com/1177326" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177397", "url": "https://bugzilla.suse.com/1177397" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177500", "url": "https://bugzilla.suse.com/1177500" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177679", "url": "https://bugzilla.suse.com/1177679" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177733", "url": "https://bugzilla.suse.com/1177733" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178203", "url": "https://bugzilla.suse.com/1178203" }, { "category": "self", "summary": "SUSE Bug 1178227", "url": "https://bugzilla.suse.com/1178227" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178270", "url": "https://bugzilla.suse.com/1178270" }, { "category": "self", "summary": "SUSE Bug 1178286", "url": "https://bugzilla.suse.com/1178286" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178401", "url": "https://bugzilla.suse.com/1178401" }, { "category": "self", "summary": "SUSE Bug 1178426", "url": "https://bugzilla.suse.com/1178426" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178612", "url": "https://bugzilla.suse.com/1178612" }, { "category": "self", "summary": "SUSE Bug 1178634", "url": "https://bugzilla.suse.com/1178634" }, { "category": "self", "summary": "SUSE Bug 1178635", "url": "https://bugzilla.suse.com/1178635" }, { "category": "self", "summary": "SUSE Bug 1178653", "url": "https://bugzilla.suse.com/1178653" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178660", "url": "https://bugzilla.suse.com/1178660" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178740", "url": "https://bugzilla.suse.com/1178740" }, { "category": "self", "summary": "SUSE Bug 1178755", "url": "https://bugzilla.suse.com/1178755" }, { "category": "self", "summary": "SUSE Bug 1178756", "url": "https://bugzilla.suse.com/1178756" }, { "category": "self", "summary": "SUSE Bug 1178762", "url": "https://bugzilla.suse.com/1178762" }, { "category": "self", "summary": "SUSE Bug 1178780", "url": "https://bugzilla.suse.com/1178780" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178853", "url": "https://bugzilla.suse.com/1178853" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179001", "url": "https://bugzilla.suse.com/1179001" }, { "category": "self", "summary": "SUSE Bug 1179012", "url": "https://bugzilla.suse.com/1179012" }, { "category": "self", "summary": "SUSE Bug 1179014", "url": "https://bugzilla.suse.com/1179014" }, { "category": "self", "summary": "SUSE Bug 1179015", "url": "https://bugzilla.suse.com/1179015" }, { "category": "self", "summary": "SUSE Bug 1179045", "url": "https://bugzilla.suse.com/1179045" }, { "category": "self", "summary": "SUSE Bug 1179076", "url": "https://bugzilla.suse.com/1179076" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179160", "url": "https://bugzilla.suse.com/1179160" }, { "category": "self", "summary": "SUSE Bug 1179201", "url": "https://bugzilla.suse.com/1179201" }, { "category": "self", "summary": "SUSE Bug 1179204", "url": "https://bugzilla.suse.com/1179204" }, { "category": "self", "summary": "SUSE Bug 1179211", "url": "https://bugzilla.suse.com/1179211" }, { "category": "self", "summary": "SUSE Bug 1179217", "url": "https://bugzilla.suse.com/1179217" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179424", "url": "https://bugzilla.suse.com/1179424" }, { "category": "self", "summary": "SUSE Bug 1179425", "url": "https://bugzilla.suse.com/1179425" }, { "category": "self", "summary": "SUSE Bug 1179426", "url": "https://bugzilla.suse.com/1179426" }, { "category": "self", "summary": "SUSE Bug 1179427", "url": "https://bugzilla.suse.com/1179427" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179432", "url": "https://bugzilla.suse.com/1179432" }, { "category": "self", "summary": "SUSE Bug 1179434", "url": "https://bugzilla.suse.com/1179434" }, { "category": "self", "summary": "SUSE Bug 1179435", "url": "https://bugzilla.suse.com/1179435" }, { "category": "self", "summary": "SUSE Bug 1179442", "url": "https://bugzilla.suse.com/1179442" }, { "category": "self", "summary": "SUSE Bug 1179519", "url": "https://bugzilla.suse.com/1179519" }, { "category": "self", "summary": "SUSE Bug 1179550", "url": "https://bugzilla.suse.com/1179550" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179578", "url": "https://bugzilla.suse.com/1179578" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179604", "url": "https://bugzilla.suse.com/1179604" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1179652", "url": "https://bugzilla.suse.com/1179652" }, { "category": "self", "summary": "SUSE Bug 1179656", "url": "https://bugzilla.suse.com/1179656" }, { "category": "self", "summary": "SUSE Bug 1179670", "url": "https://bugzilla.suse.com/1179670" }, { "category": "self", "summary": "SUSE Bug 1179671", "url": "https://bugzilla.suse.com/1179671" }, { "category": "self", "summary": "SUSE Bug 1179672", "url": "https://bugzilla.suse.com/1179672" }, { "category": "self", "summary": "SUSE Bug 1179673", "url": "https://bugzilla.suse.com/1179673" }, { "category": "self", "summary": "SUSE Bug 1179675", "url": "https://bugzilla.suse.com/1179675" }, { "category": "self", "summary": "SUSE Bug 1179676", "url": "https://bugzilla.suse.com/1179676" }, { "category": "self", "summary": "SUSE Bug 1179677", "url": "https://bugzilla.suse.com/1179677" }, { "category": "self", "summary": "SUSE Bug 1179678", "url": "https://bugzilla.suse.com/1179678" }, { "category": "self", "summary": "SUSE Bug 1179679", "url": "https://bugzilla.suse.com/1179679" }, { "category": "self", "summary": "SUSE Bug 1179680", "url": "https://bugzilla.suse.com/1179680" }, { "category": "self", "summary": "SUSE Bug 1179681", "url": "https://bugzilla.suse.com/1179681" }, { "category": "self", "summary": "SUSE Bug 1179682", "url": "https://bugzilla.suse.com/1179682" }, { "category": "self", "summary": "SUSE Bug 1179683", "url": "https://bugzilla.suse.com/1179683" }, { "category": "self", "summary": "SUSE Bug 1179684", "url": "https://bugzilla.suse.com/1179684" }, { "category": "self", "summary": "SUSE Bug 1179685", "url": "https://bugzilla.suse.com/1179685" }, { "category": "self", "summary": "SUSE Bug 1179687", "url": "https://bugzilla.suse.com/1179687" }, { "category": "self", "summary": "SUSE Bug 1179688", "url": "https://bugzilla.suse.com/1179688" }, { "category": "self", "summary": "SUSE Bug 1179689", "url": "https://bugzilla.suse.com/1179689" }, { "category": "self", "summary": "SUSE Bug 1179690", "url": "https://bugzilla.suse.com/1179690" }, { "category": "self", "summary": "SUSE Bug 1179703", "url": "https://bugzilla.suse.com/1179703" }, { "category": "self", "summary": "SUSE Bug 1179704", "url": "https://bugzilla.suse.com/1179704" }, { "category": "self", "summary": "SUSE Bug 1179707", "url": "https://bugzilla.suse.com/1179707" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1179710", "url": "https://bugzilla.suse.com/1179710" }, { "category": "self", "summary": "SUSE Bug 1179711", "url": "https://bugzilla.suse.com/1179711" }, { "category": "self", "summary": "SUSE Bug 1179712", "url": "https://bugzilla.suse.com/1179712" }, { "category": "self", "summary": "SUSE Bug 1179713", "url": "https://bugzilla.suse.com/1179713" }, { "category": "self", "summary": "SUSE Bug 1179714", "url": "https://bugzilla.suse.com/1179714" }, { "category": "self", "summary": "SUSE Bug 1179715", "url": "https://bugzilla.suse.com/1179715" }, { "category": "self", "summary": "SUSE Bug 1179716", "url": "https://bugzilla.suse.com/1179716" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179763", "url": "https://bugzilla.suse.com/1179763" }, { "category": "self", "summary": "SUSE Bug 1179887", "url": "https://bugzilla.suse.com/1179887" }, { "category": "self", "summary": "SUSE Bug 1179888", "url": "https://bugzilla.suse.com/1179888" }, { "category": "self", "summary": "SUSE Bug 1179892", "url": "https://bugzilla.suse.com/1179892" }, { "category": "self", "summary": "SUSE Bug 1179896", "url": "https://bugzilla.suse.com/1179896" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179963", "url": "https://bugzilla.suse.com/1179963" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180056", "url": "https://bugzilla.suse.com/1180056" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180117", "url": "https://bugzilla.suse.com/1180117" }, { "category": "self", "summary": "SUSE Bug 1180258", "url": "https://bugzilla.suse.com/1180258" }, { "category": "self", "summary": "SUSE Bug 1180261", "url": "https://bugzilla.suse.com/1180261" }, { "category": "self", "summary": "SUSE Bug 1180349", "url": "https://bugzilla.suse.com/1180349" }, { "category": "self", "summary": "SUSE Bug 1180506", "url": "https://bugzilla.suse.com/1180506" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 173030", "url": "https://bugzilla.suse.com/173030" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE Bug 995541", "url": "https://bugzilla.suse.com/995541" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0110 page", "url": "https://www.suse.com/security/cve/CVE-2020-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14385 page", "url": "https://www.suse.com/security/cve/CVE-2020-14385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27830 page", "url": "https://www.suse.com/security/cve/CVE-2020-27830/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28941 page", "url": "https://www.suse.com/security/cve/CVE-2020-28941/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29369 page", "url": "https://www.suse.com/security/cve/CVE-2020-29369/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29370 page", "url": "https://www.suse.com/security/cve/CVE-2020-29370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29373 page", "url": "https://www.suse.com/security/cve/CVE-2020-29373/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for RT kernel", "tracking": { "current_release_date": "2021-02-05T15:16:03Z", "generator": { "date": "2021-02-05T15:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0242-1", "initial_release_date": "2021-02-05T15:16:03Z", "revision_history": [ { "date": "2021-02-05T15:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0110" } ], "notes": [ { "category": "general", "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0110", "url": "https://www.suse.com/security/cve/CVE-2020-0110" }, { "category": "external", "summary": "SUSE Bug 1171374 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1171374" }, { "category": "external", "summary": "SUSE Bug 1174874 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1174874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0110" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14385" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14385", "url": "https://www.suse.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "SUSE Bug 1176137 for CVE-2020-14385", "url": "https://bugzilla.suse.com/1176137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14385" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27830" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27830", "url": "https://www.suse.com/security/cve/CVE-2020-27830" }, { "category": "external", "summary": "SUSE Bug 1179656 for CVE-2020-27830", "url": "https://bugzilla.suse.com/1179656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27830" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28941" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28941", "url": "https://www.suse.com/security/cve/CVE-2020-28941" }, { "category": "external", "summary": "SUSE Bug 1178740 for CVE-2020-28941", "url": "https://bugzilla.suse.com/1178740" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28941" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29369" } ], "notes": [ { "category": "general", "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29369", "url": "https://www.suse.com/security/cve/CVE-2020-29369" }, { "category": "external", "summary": "SUSE Bug 1173504 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1173504" }, { "category": "external", "summary": "SUSE Bug 1179432 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179432" }, { "category": "external", "summary": "SUSE Bug 1179646 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179646" }, { "category": "external", "summary": "SUSE Bug 1182109 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1182109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29369" }, { "cve": "CVE-2020-29370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29370" } ], "notes": [ { "category": "general", "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29370", "url": "https://www.suse.com/security/cve/CVE-2020-29370" }, { "category": "external", "summary": "SUSE Bug 1179435 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179435" }, { "category": "external", "summary": "SUSE Bug 1179648 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29370" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29373", "url": "https://www.suse.com/security/cve/CVE-2020-29373" }, { "category": "external", "summary": "SUSE Bug 1179434 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179434" }, { "category": "external", "summary": "SUSE Bug 1179779 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29373" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
rhsa-2020:4431
Vulnerability from csaf_redhat
Published
2020-11-04 00:53
Modified
2025-08-19 00:22
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)
* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)
* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)
* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)
* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)
* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)
* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)
* kernel: use-after-free in ext4_put_super (CVE-2019-19447)
* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)
* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)
* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)
* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)
* kernel: use-after-free in debugfs_remove (CVE-2019-19770)
* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
* kernel: possible use-after-free due to a race condition in cdev_get (CVE-2020-0305)
* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)
* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)
* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)
* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)
* kernel: SELinux netlink permission check bypass (CVE-2020-10751)
* kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565)
* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)
* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)
* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)
* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)
* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)
* kernel: null pointer dereference in dlpar_parse_cc_property (CVE-2019-12614)
* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)
* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)
* kernel: memory leak in af9005_identify_state() function (CVE-2019-18809)
* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)
* kernel: memory leak in the crypto_report() function (CVE-2019-19062)
* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)
* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)
* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)
* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)
* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)
* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)
* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)
* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)
* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)\n\n* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null pointer dereference in dlpar_parse_cc_property (CVE-2019-12614)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in af9005_identify_state() function (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)\n\n* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4431", "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index" }, { "category": "external", "summary": "1660798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660798" }, { "category": "external", "summary": "1718176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176" }, { "category": "external", "summary": "1759052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052" }, { "category": "external", "summary": "1760100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100" }, { "category": "external", "summary": "1760310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310" }, { "category": "external", "summary": "1760420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420" }, { "category": "external", "summary": "1774946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946" }, { "category": "external", "summary": "1774963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963" }, { "category": "external", "summary": "1774988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988" }, { "category": "external", "summary": "1775015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015" }, { "category": "external", "summary": "1775021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021" }, { "category": "external", "summary": "1775097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097" }, { "category": "external", "summary": "1777418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418" }, { "category": "external", "summary": "1777449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449" }, { "category": "external", "summary": "1778762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778762" }, { "category": "external", "summary": "1779594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594" }, { "category": "external", "summary": "1781679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679" }, { "category": "external", "summary": "1781810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810" }, { "category": "external", "summary": "1783459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459" }, { "category": "external", "summary": "1783534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534" }, { "category": "external", "summary": "1783561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561" }, { "category": "external", "summary": "1784130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130" }, { "category": "external", "summary": "1786160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160" }, { "category": "external", "summary": "1786179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179" }, { "category": "external", "summary": "1790063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063" }, { "category": "external", "summary": "1802555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555" }, { "category": "external", "summary": "1802559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559" }, { "category": "external", "summary": "1802563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563" }, { "category": "external", "summary": "1814448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814448" }, { "category": "external", "summary": "1817718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718" }, { "category": "external", "summary": "1819377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377" }, { "category": "external", "summary": "1819399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399" }, { "category": "external", "summary": "1820402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820402" }, { "category": "external", "summary": "1822077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077" }, { "category": "external", "summary": "1823764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823764" }, { "category": "external", "summary": "1824059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059" }, { "category": "external", "summary": "1824792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792" }, { "category": "external", "summary": "1824918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918" }, { "category": "external", "summary": "1830280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830280" }, { "category": "external", "summary": "1831399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399" }, { "category": "external", "summary": "1831699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699" }, { "category": "external", "summary": "1832543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543" }, { "category": "external", "summary": "1832876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876" }, { "category": "external", "summary": "1834845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845" }, { "category": "external", "summary": "1839634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634" }, { "category": "external", "summary": "1844520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844520" }, { "category": "external", "summary": "1846380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380" }, { "category": "external", "summary": "1846964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964" }, { "category": "external", "summary": "1853447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853447" }, { "category": "external", "summary": "1856588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856588" }, { "category": "external", "summary": "1860065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065" }, { "category": "external", "summary": "1874311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4431.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-19T00:22:44+00:00", "generator": { "date": "2025-08-19T00:22:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4431", "initial_release_date": "2020-11-04T00:53:39+00:00", "revision_history": [ { "date": "2020-11-04T00:53:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T00:53:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-19T00:22:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-240.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-240.el8.x86_64", "product_id": "bpftool-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-0:4.18.0-240.el8.x86_64", "product_id": "kernel-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-240.el8.x86_64", "product_id": "kernel-core-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-240.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-240.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-240.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-240.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.el8.x86_64", "product": { "name": "perf-0:4.18.0-240.el8.x86_64", "product_id": "perf-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-240.el8.x86_64", "product_id": "python3-perf-0:4.18.0-240.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-240.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-240.el8.ppc64le", "product_id": "bpftool-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.el8.ppc64le", "product": { "name": "perf-0:4.18.0-240.el8.ppc64le", "product_id": "perf-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-240.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-240.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-240.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-240.el8.aarch64", "product_id": "bpftool-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-0:4.18.0-240.el8.aarch64", "product_id": "kernel-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-240.el8.aarch64", "product_id": "kernel-core-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-240.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-240.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-240.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-240.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.el8.aarch64", "product": { "name": "perf-0:4.18.0-240.el8.aarch64", "product_id": "perf-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-240.el8.aarch64", "product_id": "python3-perf-0:4.18.0-240.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.el8.s390x", "product": { "name": "bpftool-0:4.18.0-240.el8.s390x", "product_id": "bpftool-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-0:4.18.0-240.el8.s390x", "product_id": "kernel-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-240.el8.s390x", "product_id": "kernel-core-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-240.el8.s390x", "product_id": "kernel-devel-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-240.el8.s390x", "product_id": "kernel-headers-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-240.el8.s390x", "product_id": "kernel-modules-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-240.el8.s390x", "product_id": "kernel-tools-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.el8.s390x", "product": { "name": "perf-0:4.18.0-240.el8.s390x", "product_id": "perf-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-240.el8.s390x", "product_id": "python3-perf-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-240.el8.src", "product": { "name": "kernel-0:4.18.0-240.el8.src", "product_id": "kernel-0:4.18.0-240.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-240.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-240.el8.noarch", "product_id": "kernel-doc-0:4.18.0-240.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src" }, "product_reference": "kernel-0:4.18.0-240.el8.src", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64" }, "product_reference": "perf-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x" }, "product_reference": "perf-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64" }, "product_reference": "perf-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src" }, "product_reference": "kernel-0:4.18.0-240.el8.src", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64" }, "product_reference": "perf-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x" }, "product_reference": "perf-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64" }, "product_reference": "perf-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "relates_to_product_reference": "CRB-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "relates_to_product_reference": "CRB-8.3.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9455", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819399" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "RHBZ#1819399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455" } ], "release_date": "2019-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure" }, { "cve": "CVE-2019-9458", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-09-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819377" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "RHBZ#1819377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458" } ], "release_date": "2019-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation" }, { "cve": "CVE-2019-12614", "discovery_date": "2019-06-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1718176" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel\u0027s Dynamic Logical Partitioning (DLPAR) functionality on PowerPC systems handled low memory conditions on device discovery. An attacker who can change the LPAR configuration and incur low memory conditions at the same time could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "An attacker needs to be highly privileged to exploit this issue. He either needs to trigger LPAR configuration change (or wait for such event to happen) and incur low memory conditions at the same time. It could be argued that possessing privileges required to exploit this issue could have the same impact as the issue itself.\n\nThe indications say that this issue was found by static code analysing tool which looks for memory allocations without failure checks and not actually reproduced on a running system. The CVE assignment also looks automated and following the \"better be safe than sorry\" approach.\n\nAs such, this issue is theoretical in nature and Low impact at best.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "RHBZ#1718176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12614", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614" } ], "release_date": "2019-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service" }, { "cve": "CVE-2019-15917", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760100" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15917" }, { "category": "external", "summary": "RHBZ#1760100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c" }, { "cve": "CVE-2019-15925", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-09-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759052" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15925" }, { "category": "external", "summary": "RHBZ#1759052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time. For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg" }, { "cve": "CVE-2019-16231", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760310" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "RHBZ#1760310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/", "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" } ], "release_date": "2019-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c" }, { "cve": "CVE-2019-16233", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760420" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "RHBZ#1760420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c" }, { "cve": "CVE-2019-18808", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777418" } ], "notes": [ { "category": "description", "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "RHBZ#1777418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c" }, { "cve": "CVE-2019-18809", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777449" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18809" }, { "category": "external", "summary": "RHBZ#1777449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c" }, { "cve": "CVE-2019-19046", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774988" } ], "notes": [ { "category": "description", "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19046" }, { "category": "external", "summary": "RHBZ#1774988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c" }, { "cve": "CVE-2019-19056", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775097" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19056" }, { "category": "external", "summary": "RHBZ#1775097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS" }, { "cve": "CVE-2019-19062", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775021" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19062" }, { "category": "external", "summary": "RHBZ#1775021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS" }, { "cve": "CVE-2019-19063", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19063" }, { "category": "external", "summary": "RHBZ#1775015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS" }, { "cve": "CVE-2019-19068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774963" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19068" }, { "category": "external", "summary": "RHBZ#1774963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS" }, { "cve": "CVE-2019-19072", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19072" }, { "category": "external", "summary": "RHBZ#1774946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS" }, { "cve": "CVE-2019-19319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1784130" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "RHBZ#1784130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c" }, { "cve": "CVE-2019-19332", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-12-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1779594" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "RHBZ#1779594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332" }, { "category": "external", "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/", "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1", "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid" }, { "cve": "CVE-2019-19447", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "RHBZ#1781679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447" }, { "category": "external", "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433", "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433" }, { "category": "external", "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447", "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447" } ], "release_date": "2019-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading. However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c" }, { "cve": "CVE-2019-19524", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783459" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19524" }, { "category": "external", "summary": "RHBZ#1783459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524" } ], "release_date": "2019-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free" }, { "cve": "CVE-2019-19533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783534" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information. The highest threat from this vulnerability is a breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19533" }, { "category": "external", "summary": "RHBZ#1783534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533" } ], "release_date": "2019-08-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c" }, { "cve": "CVE-2019-19537", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2019-12-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783561" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19537" }, { "category": "external", "summary": "RHBZ#1783561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537" } ], "release_date": "2019-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer" }, { "cve": "CVE-2019-19543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781810" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19543" }, { "category": "external", "summary": "RHBZ#1781810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543" } ], "release_date": "2019-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "As the module will be auto-loaded when the relevant hardware is required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c" }, { "cve": "CVE-2019-19602", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "discovery_date": "2019-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1784572" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. When compiled with GCC 9, a vector register corruption occurs on return from a signal handler where the top page of the signal stack had not yet been paged in which can allow a local attacker with special user privilege (or root) to leak kernel internal information. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19602" }, { "category": "external", "summary": "RHBZ#1784572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19602", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602" } ], "release_date": "2019-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS" }, { "cve": "CVE-2019-19767", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786160" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19767" }, { "category": "external", "summary": "RHBZ#1786160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767" } ], "release_date": "2019-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c" }, { "cve": "CVE-2019-19770", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786179" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19770" }, { "category": "external", "summary": "RHBZ#1786179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c" }, { "cve": "CVE-2019-20054", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1790063" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "RHBZ#1790063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054" } ], "release_date": "2019-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c" }, { "cve": "CVE-2019-20636", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-04-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824059" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write via crafted keycode table", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20636" }, { "category": "external", "summary": "RHBZ#1824059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636" } ], "release_date": "2020-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write via crafted keycode table" }, { "cve": "CVE-2019-20812", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846462" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the error code path and privileges required (CAP_NET_RAW).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "RHBZ#1846462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20812", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812" } ], "release_date": "2019-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error" }, { "cve": "CVE-2020-0305", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1860065" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "RHBZ#1860065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079" } ], "release_date": "2020-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c" }, { "cve": "CVE-2020-0444", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920474" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "RHBZ#1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege" }, { "cve": "CVE-2020-8647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-02-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802563" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because the information leak is limited.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "RHBZ#1802563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console. This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c" }, { "cve": "CVE-2020-8648", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-02-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802559" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is moderate, because of the need of additional privileges (usually local console user).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "RHBZ#1802559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c" }, { "cve": "CVE-2020-8649", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-02-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802555" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "RHBZ#1802555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c" }, { "cve": "CVE-2020-10732", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2020-05-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831399" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: uninitialized kernel data leak in userspace coredumps", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "RHBZ#1831399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732" } ], "release_date": "2020-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system. This disables core dumps which may not be a suitable workaround in your environment.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: uninitialized kernel data leak in userspace coredumps" }, { "cve": "CVE-2020-10751", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2020-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1839634" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SELinux netlink permission check bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "RHBZ#1839634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6" }, { "category": "external", "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/", "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5", "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5" } ], "release_date": "2020-04-27T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: SELinux netlink permission check bypass" }, { "cve": "CVE-2020-10773", "cwe": { "id": "CWE-626", "name": "Null Byte Interaction Error (Poison Null Byte)" }, "discovery_date": "2019-10-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846380" } ], "notes": [ { "category": "description", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u2019s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel stack information leak on s390/s390x", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of being limited to only s390 architecture and very limited kernel stack exposure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "RHBZ#1846380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10773", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f" } ], "release_date": "2019-10-28T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: kernel stack information leak on s390/s390x" }, { "cve": "CVE-2020-10774", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "discovery_date": "2020-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846964" } ], "notes": [ { "category": "description", "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10774" }, { "category": "external", "summary": "RHBZ#1846964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features" }, { "cve": "CVE-2020-10942", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-03-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817718" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "RHBZ#1817718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field" }, { "cve": "CVE-2020-11565", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-04-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824918" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11565" }, { "category": "external", "summary": "RHBZ#1824918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565" } ], "release_date": "2020-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c" }, { "cve": "CVE-2020-11668", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824792" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "RHBZ#1824792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c" }, { "cve": "CVE-2020-12465", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831699" } ], "notes": [ { "category": "description", "text": "A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12465" }, { "category": "external", "summary": "RHBZ#1831699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module mt76 onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c" }, { "cve": "CVE-2020-12655", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832543" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "RHBZ#1832543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata" }, { "cve": "CVE-2020-12659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832876" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "RHBZ#1832876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659" } ], "release_date": "2020-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption" }, { "cve": "CVE-2020-12770", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-05-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1834845" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12770" }, { "category": "external", "summary": "RHBZ#1834845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770" } ], "release_date": "2020-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ] } ], "cve": "CVE-2020-12826", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2020-03-27T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1822077" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12826" }, { "category": "external", "summary": "RHBZ#1822077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da" }, { "category": "external", "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803", "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803" }, { "category": "external", "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1", "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1" } ], "release_date": "2020-05-12T05:40:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process" }, { "acknowledgments": [ { "names": [ "Rakesh Rakesh" ], "organization": "Netezza Support" } ], "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874311" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "RHBZ#1874311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254" } ], "release_date": "2020-05-07T19:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF" }, { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" }, { "acknowledgments": [ { "names": [ "Zhenpeng Lin" ] } ], "cve": "CVE-2021-3715", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993988" } ], "notes": [ { "category": "description", "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3715" }, { "category": "external", "summary": "RHBZ#1993988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359" } ], "release_date": "2021-09-07T08:25:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c" }, { "cve": "CVE-2022-50219", "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373517" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix KASAN use-after-free Read in compute_effective_progs\n\nSyzbot found a Use After Free bug in compute_effective_progs().\nThe reproducer creates a number of BPF links, and causes a fault\ninjected alloc to fail, while calling bpf_link_detach on them.\nLink detach triggers the link to be freed by bpf_link_free(),\nwhich calls __cgroup_bpf_detach() and update_effective_progs().\nIf the memory allocation in this function fails, the function restores\nthe pointer to the bpf_cgroup_link on the cgroup list, but the memory\ngets freed just after it returns. After this, every subsequent call to\nupdate_effective_progs() causes this already deallocated pointer to be\ndereferenced in prog_list_length(), and triggers KASAN UAF error.\n\nTo fix this issue don\u0027t preserve the pointer to the prog or link in the\nlist, but remove it and replace it with a dummy prog without shrinking\nthe table. The subsequent call to __cgroup_bpf_detach() or\n__cgroup_bpf_detach() will correct it.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50219" }, { "category": "external", "summary": "RHBZ#2373517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs" }, { "cve": "CVE-2025-21727", "cwe": { "id": "CWE-820", "name": "Missing Synchronization" }, "discovery_date": "2025-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348516" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: fix UAF in padata_reorder\n\nA bug was found when run ltp test:\n\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\n\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\n\nIf \u0027mdelay(10)\u0027 is added before calling \u0027padata_find_next\u0027 in the\n\u0027padata_reorder\u0027 function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\n\nThis can be explained as bellow:\n\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(\u0026pd-\u003erefcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_worker\t\t\t\tcrypto_del_alg\npadata_put_pd_cnt // sub refcnt\n\t\t\t\t\t\tpadata_free_shell\n\t\t\t\t\t\tpadata_put_pd(ps-\u003epd);\n\t\t\t\t\t\t// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\n\nIn the padata_reorder function, when it loops in \u0027while\u0027, if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n\u0027padata_find_next\u0027, which leads to UAF.\n\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in \u0027padata_free_shell\u0027 wait for all _do_serial calls\nto finish.\n\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: padata: fix UAF in padata_reorder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-21727" }, { "category": "external", "summary": "RHBZ#2348516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348516" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T" } ], "release_date": "2025-02-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T00:53:39+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src", "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x", "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: padata: fix UAF in padata_reorder" } ] }
rhsa-2021:0136
Vulnerability from csaf_redhat
Published
2021-01-14 10:32
Modified
2025-07-31 20:31
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-8.2.z6 Batch source tree (BZ#1902783)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z6 Batch source tree (BZ#1902783)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0136", "url": "https://access.redhat.com/errata/RHSA-2021:0136" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0136.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-07-31T20:31:35+00:00", "generator": { "date": "2025-07-31T20:31:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:0136", "initial_release_date": "2021-01-14T10:32:52+00:00", "revision_history": [ { "date": "2021-01-14T10:32:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-14T10:32:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T20:31:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.40.1.rt13.90.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.40.1.rt13.90.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)", "product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-14T10:32:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0136" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.src", "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64", "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.40.1.rt13.90.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" } ] }
rhsa-2021:0073
Vulnerability from csaf_redhat
Published
2021-01-12 11:34
Modified
2025-07-31 21:39
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Please backport Jitter Entropy patches (BZ#1884682)
* Sometimes hit "error: kvm run failed Bad address" when launching a guest on Power8 (BZ#1890883)
* [Intel 8.3 BUG] Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded (BZ#1893330)
* RHEL8.1 - Random memory corruption may occur due to incorrect tlbflush (BZ#1899209)
* RHEL8.1 Alpha - ISST-LTE:PNV:Witherspoon-DD2.3:woo: KDUMP hang during shutdown, lpfc loses connection to disks (rootdisk:nvme) (BZ#1900101)
* pmtu of 1280 for vxlan as bridge port won't work (BZ#1902083)
* Allocating domain failed for ehci-pci device (BZ#1902801)
* [Azure][RHEL8] IP forwarding issue in netvsc (BZ#1904326)
* pmtu not working with tunnels as bridge ports and br_netfilter loaded (BZ#1907577)
* [Regression] RHEL8.2 - [kernel 148.el8] cpu (sys) time regression in SAP HANA 2.0 benchmark benchInsertSubSelectPerformance (BZ#1908520)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Please backport Jitter Entropy patches (BZ#1884682)\n\n* Sometimes hit \"error: kvm run failed Bad address\" when launching a guest on Power8 (BZ#1890883)\n\n* [Intel 8.3 BUG] Unable to insert \u0027i10nm_edac.ko\u0027 EDAC kernel module on JVL after CPU upgraded (BZ#1893330)\n\n* RHEL8.1 - Random memory corruption may occur due to incorrect tlbflush (BZ#1899209)\n\n* RHEL8.1 Alpha - ISST-LTE:PNV:Witherspoon-DD2.3:woo: KDUMP hang during shutdown, lpfc loses connection to disks (rootdisk:nvme) (BZ#1900101)\n\n* pmtu of 1280 for vxlan as bridge port won\u0027t work (BZ#1902083)\n\n* Allocating domain failed for ehci-pci device (BZ#1902801)\n\n* [Azure][RHEL8] IP forwarding issue in netvsc (BZ#1904326)\n\n* pmtu not working with tunnels as bridge ports and br_netfilter loaded (BZ#1907577)\n\n* [Regression] RHEL8.2 - [kernel 148.el8] cpu (sys) time regression in SAP HANA 2.0 benchmark benchInsertSubSelectPerformance (BZ#1908520)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0073", "url": "https://access.redhat.com/errata/RHSA-2021:0073" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0073.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-07-31T21:39:04+00:00", "generator": { "date": "2025-07-31T21:39:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:0073", "initial_release_date": "2021-01-12T11:34:03+00:00", "revision_history": [ { "date": "2021-01-12T11:34:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-12T11:34:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T21:39:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.40.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.40.1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.40.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.40.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.40.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.40.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "bpftool-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "perf-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "perf-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.40.1.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.40.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.40.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.40.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.40.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.40.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.40.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.src", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-12T11:34:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:0073" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.src", "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.40.1.el8_2.noarch", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.40.1.el8_2.x86_64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.aarch64", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.ppc64le", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.s390x", "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.40.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" } ] }
rhsa-2020:4609
Vulnerability from csaf_redhat
Published
2020-11-04 01:14
Modified
2025-07-31 20:27
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)
* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)
* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)
* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)
* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)
* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)
* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)
* kernel: use-after-free in ext4_put_super (CVE-2019-19447)
* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)
* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)
* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)
* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)
* kernel: use-after-free in debugfs_remove (CVE-2019-19770)
* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)
* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)
* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)
* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)
* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)
* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)
* kernel: SELinux netlink permission check bypass (CVE-2020-10751)
* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)
* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)
* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)
* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)
* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)
* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)
* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)
* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)
* kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)
* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)
* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)
* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)
* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)
* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)
* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)
* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)
* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)
* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)
* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4609", "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index" }, { "category": "external", "summary": "1733495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733495" }, { "category": "external", "summary": "1759052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052" }, { "category": "external", "summary": "1760100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100" }, { "category": "external", "summary": "1760310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310" }, { "category": "external", "summary": "1760420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420" }, { "category": "external", "summary": "1774946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946" }, { "category": "external", "summary": "1774963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963" }, { "category": "external", "summary": "1774988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988" }, { "category": "external", "summary": "1775015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015" }, { "category": "external", "summary": "1775021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021" }, { "category": "external", "summary": "1775097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097" }, { "category": "external", "summary": "1777418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418" }, { "category": "external", "summary": "1777449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449" }, { "category": "external", "summary": "1779046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779046" }, { "category": "external", "summary": "1779594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594" }, { "category": "external", "summary": "1781679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679" }, { "category": "external", "summary": "1781810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810" }, { "category": "external", "summary": "1783459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459" }, { "category": "external", "summary": "1783534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534" }, { "category": "external", "summary": "1783561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561" }, { "category": "external", "summary": "1784130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130" }, { "category": "external", "summary": "1786160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160" }, { "category": "external", "summary": "1786179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179" }, { "category": "external", "summary": "1790063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063" }, { "category": "external", "summary": "1802555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555" }, { "category": "external", "summary": "1802559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559" }, { "category": "external", "summary": "1802563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563" }, { "category": "external", "summary": "1817718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718" }, { "category": "external", "summary": "1819377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377" }, { "category": "external", "summary": "1819399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399" }, { "category": "external", "summary": "1822077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077" }, { "category": "external", "summary": "1824059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059" }, { "category": "external", "summary": "1824792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792" }, { "category": "external", "summary": "1824918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918" }, { "category": "external", "summary": "1831399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399" }, { "category": "external", "summary": "1832543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543" }, { "category": "external", "summary": "1832876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876" }, { "category": "external", "summary": "1833196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833196" }, { "category": "external", "summary": "1834845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845" }, { "category": "external", "summary": "1839634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634" }, { "category": "external", "summary": "1843410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843410" }, { "category": "external", "summary": "1846964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964" }, { "category": "external", "summary": "1852298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852298" }, { "category": "external", "summary": "1859590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859590" }, { "category": "external", "summary": "1860065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065" }, { "category": "external", "summary": "1874311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4609.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-07-31T20:27:18+00:00", "generator": { "date": "2025-07-31T20:27:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4609", "initial_release_date": "2020-11-04T01:14:17+00:00", "revision_history": [ { "date": "2020-11-04T01:14:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T01:14:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T20:27:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-240.rt7.54.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-240.rt7.54.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src", "product": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src", "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "NFV-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "relates_to_product_reference": "RT-8.3.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9455", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819399" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "RHBZ#1819399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455" } ], "release_date": "2019-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure" }, { "cve": "CVE-2019-9458", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819377" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "RHBZ#1819377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458" } ], "release_date": "2019-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation" }, { "cve": "CVE-2019-15917", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760100" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15917" }, { "category": "external", "summary": "RHBZ#1760100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c" }, { "cve": "CVE-2019-15925", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759052" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15925" }, { "category": "external", "summary": "RHBZ#1759052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time. For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg" }, { "cve": "CVE-2019-16231", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760310" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "RHBZ#1760310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/", "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" } ], "release_date": "2019-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c" }, { "cve": "CVE-2019-16233", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760420" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "RHBZ#1760420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c" }, { "cve": "CVE-2019-18808", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777418" } ], "notes": [ { "category": "description", "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "RHBZ#1777418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c" }, { "cve": "CVE-2019-18809", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777449" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18809" }, { "category": "external", "summary": "RHBZ#1777449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c" }, { "cve": "CVE-2019-19046", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774988" } ], "notes": [ { "category": "description", "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19046" }, { "category": "external", "summary": "RHBZ#1774988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c" }, { "cve": "CVE-2019-19056", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775097" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19056" }, { "category": "external", "summary": "RHBZ#1775097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS" }, { "cve": "CVE-2019-19062", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775021" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19062" }, { "category": "external", "summary": "RHBZ#1775021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS" }, { "cve": "CVE-2019-19063", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19063" }, { "category": "external", "summary": "RHBZ#1775015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS" }, { "cve": "CVE-2019-19068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774963" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19068" }, { "category": "external", "summary": "RHBZ#1774963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS" }, { "cve": "CVE-2019-19072", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19072" }, { "category": "external", "summary": "RHBZ#1774946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS" }, { "cve": "CVE-2019-19319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1784130" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "RHBZ#1784130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c" }, { "cve": "CVE-2019-19332", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1779594" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "RHBZ#1779594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332" }, { "category": "external", "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/", "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1", "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid" }, { "cve": "CVE-2019-19447", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "RHBZ#1781679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447" }, { "category": "external", "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433", "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433" }, { "category": "external", "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447", "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447" } ], "release_date": "2019-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading. However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c" }, { "cve": "CVE-2019-19524", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783459" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19524" }, { "category": "external", "summary": "RHBZ#1783459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524" } ], "release_date": "2019-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free" }, { "cve": "CVE-2019-19533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783534" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information. The highest threat from this vulnerability is a breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19533" }, { "category": "external", "summary": "RHBZ#1783534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533" } ], "release_date": "2019-08-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c" }, { "cve": "CVE-2019-19537", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2019-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783561" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19537" }, { "category": "external", "summary": "RHBZ#1783561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537" } ], "release_date": "2019-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer" }, { "cve": "CVE-2019-19543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781810" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19543" }, { "category": "external", "summary": "RHBZ#1781810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543" } ], "release_date": "2019-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "As the module will be auto-loaded when the relevant hardware is required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c" }, { "cve": "CVE-2019-19767", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786160" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19767" }, { "category": "external", "summary": "RHBZ#1786160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767" } ], "release_date": "2019-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c" }, { "cve": "CVE-2019-19770", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786179" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19770" }, { "category": "external", "summary": "RHBZ#1786179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c" }, { "cve": "CVE-2019-20054", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1790063" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "RHBZ#1790063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054" } ], "release_date": "2019-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c" }, { "cve": "CVE-2019-20636", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824059" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write via crafted keycode table", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20636" }, { "category": "external", "summary": "RHBZ#1824059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636" } ], "release_date": "2020-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write via crafted keycode table" }, { "cve": "CVE-2020-0305", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1860065" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "RHBZ#1860065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079" } ], "release_date": "2020-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c" }, { "cve": "CVE-2020-8647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802563" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because the information leak is limited.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "RHBZ#1802563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console. This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c" }, { "cve": "CVE-2020-8648", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802559" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is moderate, because of the need of additional privileges (usually local console user).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "RHBZ#1802559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c" }, { "cve": "CVE-2020-8649", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802555" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "RHBZ#1802555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649" } ], "release_date": "2020-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c" }, { "cve": "CVE-2020-10732", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831399" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: uninitialized kernel data leak in userspace coredumps", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "RHBZ#1831399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732" } ], "release_date": "2020-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system. This disables core dumps which may not be a suitable workaround in your environment.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: uninitialized kernel data leak in userspace coredumps" }, { "cve": "CVE-2020-10751", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2020-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1839634" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SELinux netlink permission check bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "RHBZ#1839634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6" }, { "category": "external", "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/", "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5", "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5" } ], "release_date": "2020-04-27T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: SELinux netlink permission check bypass" }, { "cve": "CVE-2020-10774", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846964" } ], "notes": [ { "category": "description", "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10774" }, { "category": "external", "summary": "RHBZ#1846964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features" }, { "cve": "CVE-2020-10942", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817718" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "RHBZ#1817718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field" }, { "cve": "CVE-2020-11565", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824918" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11565" }, { "category": "external", "summary": "RHBZ#1824918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565" } ], "release_date": "2020-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c" }, { "cve": "CVE-2020-11668", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1824792" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "RHBZ#1824792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c" }, { "cve": "CVE-2020-12655", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832543" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "RHBZ#1832543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata" }, { "cve": "CVE-2020-12659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832876" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "RHBZ#1832876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659" } ], "release_date": "2020-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption" }, { "cve": "CVE-2020-12770", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1834845" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12770" }, { "category": "external", "summary": "RHBZ#1834845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770" } ], "release_date": "2020-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ] } ], "cve": "CVE-2020-12826", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2020-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1822077" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12826" }, { "category": "external", "summary": "RHBZ#1822077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da" }, { "category": "external", "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803", "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803" }, { "category": "external", "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1", "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1" } ], "release_date": "2020-05-12T05:40:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process" }, { "acknowledgments": [ { "names": [ "Rakesh Rakesh" ], "organization": "Netezza Support" } ], "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874311" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "RHBZ#1874311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254" } ], "release_date": "2020-05-07T19:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF" }, { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" }, { "acknowledgments": [ { "names": [ "Zhenpeng Lin" ] } ], "cve": "CVE-2021-3715", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993988" } ], "notes": [ { "category": "description", "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3715" }, { "category": "external", "summary": "RHBZ#1993988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359" } ], "release_date": "2021-09-07T08:25:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T01:14:17+00:00", "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4609" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src", "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64", "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c" } ] }
rhsa-2020:5374
Vulnerability from csaf_redhat
Published
2020-12-08 17:45
Modified
2025-07-31 20:29
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* CNB: net: fix AF_PACKET transport_offset (BZ#1889727)
* [Hyper-V][RHEL 8.2] Four Mellanox Patches needed for kernels that have that have SRIOV (BZ#1892342)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* CNB: net: fix AF_PACKET transport_offset (BZ#1889727)\n\n* [Hyper-V][RHEL 8.2] Four Mellanox Patches needed for kernels that have that have SRIOV (BZ#1892342)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5374", "url": "https://access.redhat.com/errata/RHSA-2020:5374" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5374.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-07-31T20:29:42+00:00", "generator": { "date": "2025-07-31T20:29:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:5374", "initial_release_date": "2020-12-08T17:45:18+00:00", "revision_history": [ { "date": "2020-12-08T17:45:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-08T17:45:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T20:29:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.34.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.34.1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.34.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.34.1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "perf-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "perf-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.34.1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "product": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "product_id": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.34.1.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "bpftool-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "perf-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "perf-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.34.1.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.34.1.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.34.1.el8_1.src", "product_id": "kernel-0:4.18.0-147.34.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.34.1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.34.1.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.34.1.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.src", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-08T17:45:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:5374" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.34.1.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.34.1.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.34.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" } ] }
rhsa-2020:5079
Vulnerability from csaf_redhat
Published
2020-11-10 18:10
Modified
2025-07-31 20:27
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL-Alt-7.6 - kernel "Oops: Kernel access of bad area" in crypto_unregister_instance while running LTP testcase crypto_user02 (BZ#1882230)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL-Alt-7.6 - kernel \"Oops: Kernel access of bad area\" in crypto_unregister_instance while running LTP testcase crypto_user02 (BZ#1882230)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5079", "url": "https://access.redhat.com/errata/RHSA-2020:5079" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5079.json" } ], "title": "Red Hat Security Advisory: kernel-alt security and bug fix update", "tracking": { "current_release_date": "2025-07-31T20:27:29+00:00", "generator": { "date": "2025-07-31T20:27:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:5079", "initial_release_date": "2020-11-10T18:10:34+00:00", "revision_history": [ { "date": "2020-11-10T18:10:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T18:10:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T20:27:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.33.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.33.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.33.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.33.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.33.1.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.33.1.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.33.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.33.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.33.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.33.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.33.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.33.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25641", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881424" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" ], "known_not_affected": [ "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "RHBZ#1881424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "category": "external", "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" } ], "release_date": "2020-09-30T00:24:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-10T18:10:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5079" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.33.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.33.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.33.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.33.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS" } ] }
gsd-2020-25641
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-25641", "description": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "id": "GSD-2020-25641", "references": [ "https://www.suse.com/security/cve/CVE-2020-25641.html", "https://access.redhat.com/errata/RHSA-2021:0136", "https://access.redhat.com/errata/RHSA-2021:0073", "https://access.redhat.com/errata/RHSA-2020:5374", "https://access.redhat.com/errata/RHSA-2020:5079", "https://access.redhat.com/errata/RHSA-2020:4609", "https://access.redhat.com/errata/RHSA-2020:4431", "https://ubuntu.com/security/CVE-2020-25641", "https://advisories.mageia.org/CVE-2020-25641.html", "https://alas.aws.amazon.com/cve/html/CVE-2020-25641.html", "https://linux.oracle.com/cve/CVE-2020-25641.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-25641" ], "details": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "id": "GSD-2020-25641", "modified": "2023-12-13T01:21:57.230663Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "kernel versions before 5.9-rc7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "name": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "refsource": "MISC", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "name": "[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "name": "openSUSE-SU-2020:1655", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "name": "USN-4576-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4576-1/" }, { "name": "openSUSE-SU-2020:1698", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.8.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.9.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25641" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "name": "https://www.kernel.org/doc/html/latest/block/biovecs.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "name": "[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" }, { "name": "openSUSE-SU-2020:1655", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "name": "USN-4576-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4576-1/" }, { "name": "openSUSE-SU-2020:1698", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-11-21T19:36Z", "publishedDate": "2020-10-06T14:15Z" } } }
ghsa-8c9g-77vh-m2jv
Vulnerability from github
Published
2022-05-24 17:30
Modified
2022-11-21 21:30
Severity ?
VLAI Severity ?
Details
A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
{ "affected": [], "aliases": [ "CVE-2020-25641" ], "database_specific": { "cwe_ids": [ "CWE-835" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-10-06T14:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "id": "GHSA-8c9g-77vh-m2jv", "modified": "2022-11-21T21:30:17Z", "published": "2022-05-24T17:30:10Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4576-1" }, { "type": "WEB", "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2020/10/06/9" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…